Samba Input Validation Denial of Service Vulnerability [CVE-2018-1140]
CVE Number = CVE-2018-1140
A vulnerability in the Samba Active Directory domain controller (AD DC) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on a targeted system.
The vulnerability is due to insufficient validation of user-supplied input parameters to the ldbdatabase layer by the affected software. An attacker could exploit this vulnerability by sending crafted remote procedure call (RPC) requests to a targeted Samba AD DC. A successful exploit could lead to a NULL pointer dereference error and cause the Lightweight Directory Access Protocol (LDAP) server and DNS to crash, resulting in a DoS condition.
Samba.org confirmed the vulnerability and released patches.
-
To exploit this vulnerability, the attacker must be on the same physical or logical network to send crafted RPC requests to a targeted AD DC, making exploitation more difficult in environments that restrict network access from untrusted sources.
-
Administrators are advised to apply the appropriate updates.
Administrators are advised to allow only trusted users to have network access.
Administrators are advised to monitor affected systems.
-
Samba.org released a security announcement at the following link: CVE-2018-1140
-
Samba.org released patches at the following link: Samba Security Releases