First published: Tue Oct 12 2021(Updated: )
A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/heimdal | <=7.7.0+dfsg-2<=7.5.0+dfsg-3 | 7.7.0+dfsg-3 7.7.0+dfsg-2+deb11u1 |
Samba Samba | <4.13.12 | |
Samba Samba | >=4.14.0<4.14.8 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Netapp Management Services For Element Software | ||
Netapp Management Services For Netapp Hci | ||
NetApp ONTAP Select Deploy administration utility | ||
redhat/samba | <4.13.12 | 4.13.12 |
redhat/samba | <4.14.8 | 4.14.8 |
debian/heimdal | 7.7.0+dfsg-2+deb11u3 7.8.git20221117.28daf24+dfsg-2 7.8.git20221117.28daf24+dfsg-8 | |
debian/samba | 2:4.13.13+dfsg-1~deb11u6 2:4.17.12+dfsg-0+deb12u1 2:4.21.1+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3671
The severity of CVE-2021-3671 is medium.
CVE-2021-3671 is a vulnerability in the samba kerberos server where a null pointer de-reference can allow an authenticated user to crash the server.
The affected software includes Ubuntu's heimdal package versions 1.6~ (trusty), 7.7.0+dfsg-3 (heimdal/upstream), 7.5.0+dfsg-1ubuntu0.1 (bionic), 7.7.0+dfsg-1ubuntu1.1 (focal), 1.7~ (xenial); Ubuntu's samba package versions 2:4.13.14+dfsg-0ubuntu0.21.10.1 (impish), 4.13.13 (upstream), 2:4.13.14+dfsg-0ubuntu0.20.04.1 (focal), 2:4.13.14+dfsg-0ubuntu0.21.04.1 (hirsute), 2:4.7.6+dfsg~ubuntu-0ubuntu2.26 (bionic), 2:4.13.14+dfsg-0ubuntu1 (jammy), 2:4.13.14+dfsg-0ubuntu1 (kinetic), 2:4.13.14+dfsg-0ubuntu1 (lunar); Red Hat's samba package versions 4.13.12, 4.14.8; Debian's heimdal package versions 7.5.0+dfsg-3+deb10u2, 7.7.0+dfsg-2+deb11u3, 7.8.git20221117.28daf24+dfsg-2, 7.8.git20221117.28daf24+dfsg-3; Debian's samba package versions 2:4.13.13+dfsg-1~deb11u5, 2:4.17.9+dfsg-0+deb12u3, 2:4.17.10+dfsg-0+deb12u1, 2:4.19.0+dfsg-1.
Yes, there are references available for CVE-2021-3671. They can be found at the following URLs: https://bugzilla.redhat.com/show_bug.cgi?id=2013080, https://bugzilla.samba.org/show_bug.cgi?id=14770, https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a