vulnerability
Huawei EulerOS: CVE-2019-14907: samba security update
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:N/AC:H/Au:N/C:N/I:N/A:P) | Jan 21, 2020 | Feb 24, 2020 | Aug 13, 2025 |
Severity
3
CVSS
(AV:N/AC:H/Au:N/C:N/I:N/A:P)
Published
Jan 21, 2020
Added
Feb 24, 2020
Modified
Aug 13, 2025
Description
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
Solutions
huawei-euleros-2_0_sp5-upgrade-libsmbclienthuawei-euleros-2_0_sp5-upgrade-libwbclienthuawei-euleros-2_0_sp5-upgrade-sambahuawei-euleros-2_0_sp5-upgrade-samba-clienthuawei-euleros-2_0_sp5-upgrade-samba-client-libshuawei-euleros-2_0_sp5-upgrade-samba-commonhuawei-euleros-2_0_sp5-upgrade-samba-common-libshuawei-euleros-2_0_sp5-upgrade-samba-common-toolshuawei-euleros-2_0_sp5-upgrade-samba-libshuawei-euleros-2_0_sp5-upgrade-samba-pythonhuawei-euleros-2_0_sp5-upgrade-samba-winbindhuawei-euleros-2_0_sp5-upgrade-samba-winbind-clientshuawei-euleros-2_0_sp5-upgrade-samba-winbind-modules
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.