Samba Input Validation Denial of Service Vulnerability [CVE-2018-1140]

CVE Number = CVE-2018-1140

A vulnerability in the Samba Active Directory domain controller (AD DC) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on a targeted system.

The vulnerability is due to insufficient validation of user-supplied input parameters to the ldbdatabase layer by the affected software. An attacker could exploit this vulnerability by sending crafted remote procedure call (RPC) requests to a targeted Samba AD DC. A successful exploit could lead to a NULL pointer dereference error and cause the Lightweight Directory Access Protocol (LDAP) server and DNS to crash, resulting in a DoS condition.

Samba.org confirmed the vulnerability and released patches.

Analysis
  • To exploit this vulnerability, the attacker must be on the same physical or logical network to send crafted RPC requests to a targeted AD DC, making exploitation more difficult in environments that restrict network access from untrusted sources.
Safeguards
  • Administrators are advised to apply the appropriate updates.

    Administrators are advised to allow only trusted users to have network access.

    Administrators are advised to monitor affected systems.

Vendor Announcements
  • Samba.org released a security announcement at the following link: CVE-2018-1140

Fixed Software
  • Samba.org released patches at the following link: Samba Security Releases



Duncan Newell

Duncan is a technology professional with over 20 years experience of working in various IT roles. He also has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: