Description
Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba's KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with talloc_free() and directly calls abort(), terminating the KDC process.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4345-1 | samba security update |
Ubuntu USN |
USN-3827-1 | Samba vulnerabilities |
Ubuntu USN |
USN-3827-2 | Samba vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T10:32:54.002Z
Reserved: 2018-09-11T00:00:00.000Z
Link: CVE-2018-16841
No data.
Status : Modified
Published: 2018-11-28T14:29:00.347
Modified: 2024-11-21T03:53:25.367
Link: CVE-2018-16841
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN