Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
aports
aports
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 647
    • Issues 647
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 204
    • Merge Requests 204
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Incidents
    • Environments
  • Analytics
    • Analytics
    • CI / CD
    • Repository
    • Value Stream
  • Members
    • Members
  • Collapse sidebar
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
  • alpine
  • aportsaports
  • Issues
  • #10590

Closed
Open
Opened Jun 20, 2019 by Alicha CH@alichaReporter

[3.10] samba: Multiple vulnerabilities (CVE-2019-12435, CVE-2019-12436)

CVE-2019-12435: Samba AD DC Denial of Service in DNS management server (dnsserver)

The (poorly named) dnsserver RPC pipe provides administrative
facilities to modify DNS records and zones.

An authenticated user can crash the RPC server process via a NULL
pointer de-reference.

There is no further vulnerability associated with this issue, merely a
denial of service.

Affected Versions:

Samba 4.9 and 4.10

Fixed In Version:

Samba 4.9.9 and 4.10.5

References:

https://www.samba.org/samba/security/CVE-2019-12435.html
https://www.samba.org/samba/history/security.html

Patches:

https://download.samba.org/pub/samba/patches/security/samba-4.9.8-security-2019-06-19.patch
https://download.samba.org/pub/samba/patches/security/samba-4.10.4-security-2019-06-19.patch

CVE-2019-12436: Samba AD DC LDAP server crash (paged searches)

A user with read access to the LDAP server can crash the LDAP
server process. Depending on the Samba version and the choice
of process model, this may crash only the user’s own connection.

Specifically, while in Samba 4.10 the default is for one process per
connected client, site-specific configuration trigger can change
this.

Samba 4.10 also supports the ‘prefork’ process model and by
using the -M option to ‘samba’ and a ‘single’ process model.
Both of these share on process between multiple clients.

Affected Versions:

All versions of Samba since Samba 4.10.0

Fixed In Version:

Samba 4.10.5

References:

https://www.samba.org/samba/security/CVE-2019-12436.html

Patch:

https://download.samba.org/pub/samba/patches/security/samba-4.10.4-security-2019-06-19.patch

(from redmine: issue id 10590, created on 2019-06-20, closed on 2019-06-21)

  • Relations:
    • parent #10588 (closed)
To upload designs, you'll need to enable LFS and have admin enable hashed storage. More information
Assignee
Assign to
3.10.1
Milestone
3.10.1 (Past due)
Assign milestone
Time tracking
None
Due date
None
Reference: alpine/aports#10590