ID CVE-2018-16857
Summary Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade.
Vulnerable Configurations
  • Samba 4.9.0
  • Samba 4.9.1
Base: 4.3
nessus via4
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_54976998F24811E881E2005056A311D1.NASL
    description The samba project reports : All versions of Samba from 4.0.0 onwards are vulnerable to infinite query recursion caused by CNAME loops. Any dns record can be added via ldap by an unprivileged user using the ldbadd tool, so this is a security issue. When configured to accept smart-card authentication, Samba's KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. During the processing of an LDAP search before Samba's AD DC returns the LDAP entries to the client, the entries are cached in a single memory object with a maximum size of 256MB. When this size is reached, the Samba process providing the LDAP service will follow the NULL pointer, terminating the process. During the processing of an DNS zone in the DNS management DCE/RPC server, the internal DNS server or the Samba DLZ plugin for BIND9, if the DSPROPERTY_ZONE_MASTER_SERVERS property or DSPROPERTY_ZONE_SCAVENGING_SERVERS property is set, the server will follow a NULL pointer and terminate A user in a Samba AD domain can crash the KDC when Samba is built in the non-default MIT Kerberos configuration. AD DC Configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all.
    last seen 2019-02-21
    modified 2019-02-05
    plugin id 119246
    published 2018-11-28
    reporter Tenable
    title FreeBSD : samba -- multiple vulnerabilities (54976998-f248-11e8-81e2-005056a311d1)
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2018-333-01.NASL
    description New samba packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
    last seen 2019-02-06
    modified 2019-02-05
    plugin id 119280
    published 2018-11-29
    reporter Tenable
    title Slackware 14.0 / 14.1 / 14.2 / current : samba (SSA:2018-333-01)
  • NASL family Misc.
    NASL id SAMBA_4_7_12.NASL
    description The version of Samba running on the remote host is 4.7.x prior to 4.7.12, or 4.8.x prior to 4.8.7, or 4.9.x prior to 4.9.3. It is, therefore, affected by multiple vulnerabilities. Notes: - Refer to vendor advisories for possible workarounds. - CVE-2018-16852 and CVE-2018-16857 only apply to 4.9.x. Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.
    last seen 2019-02-21
    modified 2018-11-30
    plugin id 119306
    published 2018-11-30
    reporter Tenable
    title Samba 4.7.x < 4.7.12 / 4.8.x < 4.8.7 / 4.9.x < 4.9.3 Multiple Vulnerabilities
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2018-E423E8743F.NASL
    description Update to Samba 4.9.3 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora update system website. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2019-02-05
    plugin id 120862
    published 2019-01-03
    reporter Tenable
    title Fedora 29 : 2:samba (2018-e423e8743f)
refmap via4
bid 106024
Last major update 28-11-2018 - 09:29
Published 28-11-2018 - 09:29
Last modified 05-02-2019 - 13:49
Back to Top