First published: Wed Jun 19 2019(Updated: )
Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 has a NULL pointer dereference, leading to Denial of Service. This is related to the AD DC DNS management server (dnsserver) RPC server process.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | >=4.9.0<4.9.9 | |
Samba Samba | >=4.10.0<4.10.5 | |
ubuntu/samba | <2:4.10.0+dfsg-0ubuntu2.2 | 2:4.10.0+dfsg-0ubuntu2.2 |
ubuntu/samba | <4.9.10 | 4.9.10 |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.0~rc1+really4.20.4+dfsg-1 2:4.21.0+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12435 is a vulnerability in Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 that allows for a NULL pointer dereference, leading to denial of service.
The severity of CVE-2019-12435 is medium (6.5).
CVE-2019-12435 affects Samba versions 4.9.x before 4.9.9 and 4.10.x before 4.10.5, specifically the AD DC DNS management server (dnsserver) RPC server process.
To fix CVE-2019-12435, update Samba to version 4.9.10 or higher for Samba 4.9.x, and version 4.10.6 or higher for Samba 4.10.x.
You can find more information about CVE-2019-12435 in these references: [Link 1](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00023.html), [Link 2](http://www.securityfocus.com/bid/108825), [Link 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QSG3TLPZP35RH5DWAIDC7MHXRK5DFKOE/).