ALT-PU-2019-2676-1
Closed vulnerabilities
BDU:2019-01870
Уязвимость реализации Heimdal протокола Kerberos пакета программ сетевого взаимодействия Samba, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-00695
Уязвимость компонента обработки зоны DNS на сервере программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00697
Уязвимость конфигурации AD DC программ сетевого взаимодействия Samba, позволяющая нарушителю оказать воздействие на целостность информации
BDU:2020-00724
Уязвимость программного обеспечения Samba, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00765
Уязвимость пакета программ Samba, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю оказать воздействие на целостность и конфиденциальность данных
Modified: 2024-11-21
CVE-2018-16852
Samba from version 4.9.0 and before version 4.9.3 is vulnerable to a NULL pointer de-reference. During the processing of an DNS zone in the DNS management DCE/RPC server, the internal DNS server or the Samba DLZ plugin for BIND9, if the DSPROPERTY_ZONE_MASTER_SERVERS property or DSPROPERTY_ZONE_SCAVENGING_SERVERS property is set, the server will follow a NULL pointer and terminate. There is no further vulnerability associated with this issue, merely a denial of service.
- 106024
- 106024
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16852
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://www.samba.org/samba/security/CVE-2018-16852.html
- https://www.samba.org/samba/security/CVE-2018-16852.html
Modified: 2024-11-21
CVE-2018-16857
Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade.
- 106024
- 106024
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://security.netapp.com/advisory/ntap-20181127-0001/
- https://www.samba.org/samba/security/CVE-2018-16857.html
- https://www.samba.org/samba/security/CVE-2018-16857.html
Modified: 2024-11-21
CVE-2018-16860
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
- openSUSE-SU-2019:1888
- openSUSE-SU-2019:1888
- 20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190816 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- 20190816 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- 20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190816 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- 20190816 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860
- 20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190814 APPLE-SA-2019-8-13-1 Additional information for APPLE-SA-2019-7-22-2 macOS Mojave 10.14.6, Security Update 2019-004 High Sierra, Security Update 2019-004 Sierra
- 20190814 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190814 APPLE-SA-2019-8-13-3 Additional information for APPLE-SA-2019-7-22-4 watchOS 5.3
- 20190814 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- 20190814 APPLE-SA-2019-8-13-4 Additional information for APPLE-SA-2019-7-22-5 tvOS 12.4
- 20190814 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- 20190814 APPLE-SA-2019-8-13-2 Additional information for APPLE-SA-2019-7-22-1 iOS 12.4
- GLSA-202003-52
- GLSA-202003-52
- https://support.apple.com/HT210346
- https://support.apple.com/HT210346
- https://support.apple.com/HT210348
- https://support.apple.com/HT210348
- https://support.apple.com/HT210351
- https://support.apple.com/HT210351
- https://support.apple.com/HT210353
- https://support.apple.com/HT210353
- https://www.samba.org/samba/security/CVE-2018-16860.html
- https://www.samba.org/samba/security/CVE-2018-16860.html
- https://www.synology.com/security/advisory/Synology_SA_19_23
- https://www.synology.com/security/advisory/Synology_SA_19_23
Modified: 2024-11-21
CVE-2019-12435
Samba 4.9.x before 4.9.9 and 4.10.x before 4.10.5 has a NULL pointer dereference, leading to Denial of Service. This is related to the AD DC DNS management server (dnsserver) RPC server process.
- openSUSE-SU-2019:1755
- openSUSE-SU-2019:1755
- 108825
- 108825
- FEDORA-2019-8966706e33
- FEDORA-2019-8966706e33
- FEDORA-2019-8015e5dc40
- FEDORA-2019-8015e5dc40
- USN-4018-1
- USN-4018-1
- https://www.samba.org/samba/security/CVE-2019-12435.html
- https://www.samba.org/samba/security/CVE-2019-12435.html
- https://www.synology.com/security/advisory/Synology_SA_19_27
- https://www.synology.com/security/advisory/Synology_SA_19_27
Modified: 2024-11-21
CVE-2019-3880
A flaw was found in the way samba implemented an RPC endpoint emulating the Windows registry service API. An unprivileged attacker could use this flaw to create a new registry hive file anywhere they have unix permissions which could lead to creation of a new file in the Samba share. Versions before 4.8.11, 4.9.6 and 4.10.2 are vulnerable.
- https://access.redhat.com/security/cve/cve-2019-3880
- openSUSE-SU-2019:1180
- openSUSE-SU-2019:1180
- openSUSE-SU-2019:1292
- openSUSE-SU-2019:1292
- RHSA-2019:1966
- RHSA-2019:1966
- RHSA-2019:1967
- RHSA-2019:1967
- RHSA-2019:2099
- RHSA-2019:2099
- RHSA-2019:3582
- RHSA-2019:3582
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3880
- [debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update
- [debian-lts-announce] 20190409 [SECURITY] [DLA 1754-1] samba security update
- FEDORA-2019-db21b5f1d2
- FEDORA-2019-db21b5f1d2
- FEDORA-2019-019c5314a0
- FEDORA-2019-019c5314a0
- FEDORA-2019-cacf88eabf
- FEDORA-2019-cacf88eabf
- https://security.netapp.com/advisory/ntap-20190411-0004/
- https://security.netapp.com/advisory/ntap-20190411-0004/
- https://support.f5.com/csp/article/K20804356
- https://support.f5.com/csp/article/K20804356
- https://www.samba.org/samba/security/CVE-2019-3880.html
- https://www.samba.org/samba/security/CVE-2019-3880.html
- https://www.synology.com/security/advisory/Synology_SA_19_15
- https://www.synology.com/security/advisory/Synology_SA_19_15