First published: Wed Jun 19 2019(Updated: )
Samba 4.10.x before 4.10.5 has a NULL pointer dereference, leading to an AD DC LDAP server Denial of Service. This is related to an attacker using the paged search control. The attacker must have directory read access in order to attempt an exploit.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/samba | <2:4.10.0+dfsg-0ubuntu2.2 | 2:4.10.0+dfsg-0ubuntu2.2 |
ubuntu/samba | <4.9.10 | 4.9.10 |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.0~rc1+really4.20.4+dfsg-1 2:4.21.0+dfsg-1 | |
Samba | >=4.10.0<4.10.5 | |
Ubuntu Linux | =19.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12436 is classified as a medium severity vulnerability due to its potential to cause a Denial of Service in affected Samba versions.
To fix CVE-2019-12436, upgrade Samba to version 4.10.5 or later on your system.
Samba versions 4.10.0 to 4.10.4 are affected by CVE-2019-12436.
CVE-2019-12436 can be exploited remotely by an attacker who has directory read access.
CVE-2019-12436 facilitates a Denial of Service attack on an Active Directory LDAP server.