Debian Security Advisory
DSA-4345-1 samba -- security update
- Date Reported:
- 27 Nov 2018
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2018-14629, CVE-2018-16841, CVE-2018-16851.
- More information:
Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix. The Common Vulnerabilities and Exposures project identifies the following issues:
Florian Stuelpner discovered that Samba is vulnerable to infinite query recursion caused by CNAME loops, resulting in denial of service.
Alex MacCuish discovered that a user with a valid certificate or smart card can crash the Samba AD DC's KDC when configured to accept smart-card authentication.
Garming Sam of the Samba Team and Catalyst discovered a NULL pointer dereference vulnerability in the Samba AD DC LDAP server allowing a user able to read more than 256MB of LDAP entries to crash the Samba AD DC's LDAP server.
For the stable distribution (stretch), these problems have been fixed in version 2:4.5.12+dfsg-2+deb9u4.
We recommend that you upgrade your samba packages.
For the detailed security status of samba please refer to its security tracker page at: https://security-tracker.debian.org/tracker/samba