vulnerability
Oracle Solaris 11: CVE-2019-14907: Vulnerability in Samba
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:N/AC:H/Au:N/C:N/I:N/A:P) | Jan 21, 2020 | Jan 19, 2021 | Feb 17, 2022 |
Severity
3
CVSS
(AV:N/AC:H/Au:N/C:N/I:N/A:P)
Published
Jan 21, 2020
Added
Jan 19, 2021
Modified
Feb 17, 2022
Description
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
Solution(s)
oracle-solaris-11-4-upgrade-library-samba-libsmbclient-4-11-6-11-4-21-0-1-69-0oracle-solaris-11-4-upgrade-service-network-samba-4-11-6-11-4-21-0-1-69-0

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.