vulnerability
Samba CVE-2019-14907: Crash after failed character conversion at log level 3 or above
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:N/AC:H/Au:N/C:N/I:N/A:P) | Jan 21, 2020 | Jan 24, 2020 | Jul 13, 2020 |
Severity
3
CVSS
(AV:N/AC:H/Au:N/C:N/I:N/A:P)
Published
Jan 21, 2020
Added
Jan 24, 2020
Modified
Jul 13, 2020
Description
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
Solution(s)
samba-upgrade-4_10_12samba-upgrade-4_11_5samba-upgrade-4_9_18

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.