First published: Mon Aug 10 2020(Updated: )
Martin von Wittich and Wilko Meyer discovered that Samba incorrectly handled certain empty UDP packets when being used as a AD DC NBT server. A remote attacker could possibly use this issue to cause Samba to crash, resulting in a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/samba | <2:4.11.6+dfsg-0ubuntu1.4 | 2:4.11.6+dfsg-0ubuntu1.4 |
=20.04 | ||
All of | ||
ubuntu/samba | <2:4.7.6+dfsg~ubuntu-0ubuntu2.18 | 2:4.7.6+dfsg~ubuntu-0ubuntu2.18 |
=18.04 | ||
All of | ||
ubuntu/samba | <2:4.3.11+dfsg-0ubuntu0.16.04.29 | 2:4.3.11+dfsg-0ubuntu0.16.04.29 |
=16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the Samba vulnerability is USN-4454-1.
The Samba vulnerability can cause Samba to crash, resulting in a denial of service.
The vulnerability affects Samba versions 4.11.6+dfsg-0ubuntu1.4, 4.7.6+dfsg~ubuntu-0ubuntu2.18, and 4.3.11+dfsg-0ubuntu0.16.04.29.
The Samba vulnerability can be exploited remotely by sending certain empty UDP packets when Samba is being used as an AD DC NBT server.
To fix the Samba vulnerability, update to the latest version of Samba as specified in the Ubuntu Security Notice USN-4454-1.