First published: Mon Feb 25 2019(Updated: )
A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/ldb | 2:2.2.3-2~deb11u2 | |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.2+dfsg-3 2:4.21.2+dfsg-4 | |
Samba | <4.10.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
Debian | =8.0 | |
SUSE Samba Client | <4.10.0 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
Samba Common | <4.10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3824 is a medium severity vulnerability that can cause denial of service for the LDAP server process in Samba.
To fix CVE-2019-3824, upgrade to the recommended Samba versions: 4.10.0 or higher.
Authenticated users with read permissions on the LDAP server in Samba prior to version 4.10 are affected by CVE-2019-3824.
CVE-2019-3824 can be exploited by sending specially crafted LDAP search expressions to cause a denial of service.
Samba versions before 4.10.0 and specific Debian and Ubuntu releases with Samba pre-installed are vulnerable to CVE-2019-3824.