vulnerability

Amazon Linux AMI 2: CVE-2018-1050: Security patch for samba (ALAS-2018-1126)

Severity
3
CVSS
(AV:A/AC:L/Au:N/C:N/I:N/A:P)
Published
Mar 13, 2018
Added
Apr 27, 2020
Modified
Nov 27, 2024

Description

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

Solutions

amazon-linux-ami-2-upgrade-ctdbamazon-linux-ami-2-upgrade-ctdb-testsamazon-linux-ami-2-upgrade-libsmbclientamazon-linux-ami-2-upgrade-libsmbclient-develamazon-linux-ami-2-upgrade-libwbclientamazon-linux-ami-2-upgrade-libwbclient-develamazon-linux-ami-2-upgrade-sambaamazon-linux-ami-2-upgrade-samba-clientamazon-linux-ami-2-upgrade-samba-client-libsamazon-linux-ami-2-upgrade-samba-commonamazon-linux-ami-2-upgrade-samba-common-libsamazon-linux-ami-2-upgrade-samba-common-toolsamazon-linux-ami-2-upgrade-samba-dcamazon-linux-ami-2-upgrade-samba-dc-libsamazon-linux-ami-2-upgrade-samba-debuginfoamazon-linux-ami-2-upgrade-samba-develamazon-linux-ami-2-upgrade-samba-krb5-printingamazon-linux-ami-2-upgrade-samba-libsamazon-linux-ami-2-upgrade-samba-pidlamazon-linux-ami-2-upgrade-samba-pythonamazon-linux-ami-2-upgrade-samba-python-testamazon-linux-ami-2-upgrade-samba-testamazon-linux-ami-2-upgrade-samba-test-libsamazon-linux-ami-2-upgrade-samba-vfs-glusterfsamazon-linux-ami-2-upgrade-samba-winbindamazon-linux-ami-2-upgrade-samba-winbind-clientsamazon-linux-ami-2-upgrade-samba-winbind-krb5-locatoramazon-linux-ami-2-upgrade-samba-winbind-modules
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.