First published: Tue May 14 2019(Updated: )
Isaac Boukris and Andrew Bartlett discovered that Samba incorrectly checked S4U2Self packets. In certain environments, a remote attacker could possibly use this issue to escalate privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/samba | <2:4.10.0+dfsg-0ubuntu2.1 | 2:4.10.0+dfsg-0ubuntu2.1 |
=19.04 | ||
All of | ||
ubuntu/samba | <2:4.8.4+dfsg-2ubuntu2.4 | 2:4.8.4+dfsg-2ubuntu2.4 |
=18.10 | ||
All of | ||
ubuntu/samba | <2:4.7.6+dfsg~ubuntu-0ubuntu2.10 | 2:4.7.6+dfsg~ubuntu-0ubuntu2.10 |
=18.04 | ||
All of | ||
ubuntu/samba | <2:4.3.11+dfsg-0ubuntu0.16.04.20 | 2:4.3.11+dfsg-0ubuntu0.16.04.20 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Samba vulnerability is CVE-2018-16860.
The severity of this Samba vulnerability is not mentioned in the information provided.
This vulnerability affects Samba by incorrectly checking S4U2Self packets.
Yes, a remote attacker could possibly exploit this vulnerability to escalate privileges.
To fix this Samba vulnerability, you need to update your Samba package to version 2:4.10.0+dfsg-0ubuntu2.1 or later.