mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
109 lines
3.4 KiB
JSON
109 lines
3.4 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "sfowler@redhat.com",
|
|
"ID" : "CVE-2018-16841",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "samba",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "4.7.12"
|
|
},
|
|
{
|
|
"version_value" : "4.8.7"
|
|
},
|
|
{
|
|
"version_value" : "4.9.3"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "[UNKNOWN]"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba's KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with talloc_free() and directly calls abort(), terminating the KDC process."
|
|
}
|
|
]
|
|
},
|
|
"impact" : {
|
|
"cvss" : [
|
|
[
|
|
{
|
|
"vectorString" : "5.7/CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
|
|
"version" : "3.0"
|
|
}
|
|
]
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "CWE-416"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841"
|
|
},
|
|
{
|
|
"name" : "https://www.samba.org/samba/security/CVE-2018-16841.html",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://www.samba.org/samba/security/CVE-2018-16841.html"
|
|
},
|
|
{
|
|
"name" : "https://security.netapp.com/advisory/ntap-20181127-0001/",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://security.netapp.com/advisory/ntap-20181127-0001/"
|
|
},
|
|
{
|
|
"name" : "DSA-4345",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "https://www.debian.org/security/2018/dsa-4345"
|
|
},
|
|
{
|
|
"name" : "USN-3827-1",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "https://usn.ubuntu.com/3827-1/"
|
|
},
|
|
{
|
|
"name" : "USN-3827-2",
|
|
"refsource" : "UBUNTU",
|
|
"url" : "https://usn.ubuntu.com/3827-2/"
|
|
},
|
|
{
|
|
"name" : "106023",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/106023"
|
|
}
|
|
]
|
|
}
|
|
}
|