Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1050

Опубликовано: 13 мар. 2018
Источник: redhat
CVSS3: 4.3
EPSS Средний

Описание

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

A null pointer dereference flaw was found in Samba RPC external printer service. An attacker could use this flaw to cause the printer spooler service to crash.

Меры по смягчению последствий

Ensure the paramter: rpc_server:spoolss = external is not set in the [global] section of your smb.conf.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5sambaNot affected
Red Hat Enterprise Linux 5samba3xNot affected
Red Hat Enterprise Linux 8sambaNot affected
Red Hat Enterprise Linux 6sambaFixedRHSA-2018:186019.06.2018
Red Hat Enterprise Linux 6samba4FixedRHSA-2018:188319.06.2018
Red Hat Enterprise Linux 7sambaFixedRHSA-2018:305630.10.2018
Red Hat Gluster Storage 3.4 for RHEL 6libtallocFixedRHSA-2018:261204.09.2018
Red Hat Gluster Storage 3.4 for RHEL 6libtdbFixedRHSA-2018:261204.09.2018
Red Hat Gluster Storage 3.4 for RHEL 6libteventFixedRHSA-2018:261204.09.2018
Red Hat Gluster Storage 3.4 for RHEL 6sambaFixedRHSA-2018:261204.09.2018

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=1538771samba: NULL pointer dereference in printer server process

EPSS

Процентиль: 96%
0.25959
Средний

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
почти 8 лет назад

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

CVSS3: 4.3
nvd
почти 8 лет назад

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

CVSS3: 4.3
msrc
около 4 лет назад

Описание отсутствует

CVSS3: 4.3
debian
почти 8 лет назад

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of ...

suse-cvrf
почти 8 лет назад

Security update for samba, talloc, tevent

EPSS

Процентиль: 96%
0.25959
Средний

4.3 Medium

CVSS3

Уязвимость CVE-2018-1050