#11021: samba-4.8.4
-------------------------+-----------------------
 Reporter:  bdubbs       |       Owner:  renodr
     Type:  enhancement  |      Status:  assigned
 Priority:  highest      |   Milestone:  8.3
Component:  BOOK         |     Version:  SVN
 Severity:  normal       |  Resolution:
 Keywords:               |
-------------------------+-----------------------
Changes (by renodr):

 * owner:  blfs-book => renodr
 * priority:  normal => highest
 * status:  new => assigned


Old description:

> New point version.

New description:

 New point version.

 NOTE: This release is designated as "critical" by the Samba team.


 {{{
  =============================
                    Release Notes for Samba 4.8.4
                            August 14, 2018
                    =============================


 This is a security release in order to address the following defects:

 o  CVE-2018-1139  (Weak authentication protocol allowed.)
 o  CVE-2018-1140  (Denial of Service Attack on DNS and LDAP server.)
 o  CVE-2018-10858 (Insufficient input validation on client directory
                    listing in libsmbclient.)
 o  CVE-2018-10918 (Denial of Service Attack on AD DC DRSUAPI server.)
 o  CVE-2018-10919 (Confidential attribute disclosure from the AD LDAP
                    server.)


 =======
 Details
 =======

 o  CVE-2018-1139:
    Vulnerability that allows authentication via NTLMv1 even if disabled.

 o  CVE-2018-1140:
    Missing null pointer checks may crash the Samba AD DC, both over
    DNS and LDAP.

 o  CVE-2018-10858:
    A malicious server could return a directory entry that could corrupt
    libsmbclient memory.

 o  CVE-2018-10918:
    Missing null pointer checks may crash the Samba AD DC, over the
    authenticated DRSUAPI RPC service.

 o  CVE-2018-10919:
    Missing access control checks allow discovery of confidential attribute
    values via authenticated LDAP search expressions.


 Changes since 4.8.3:
 --------------------

 o  Jeremy Allison <[email protected]>
    * BUG 13453: CVE-2018-10858: libsmb: Harden smbc_readdir_internal()
 against
      returns from malicious servers.

 o  Andrew Bartlett <[email protected]>
    * BUG 13374: CVE-2018-1140: ldbsearch '(distinguishedName=abc)' and DNS
 query
      with escapes crashes, ldb: Release LDB 1.3.5 for CVE-2018-1140
    * BUG 13552: CVE-2018-10918: cracknames: Fix DoS (NULL pointer de-ref)
 when
      not servicePrincipalName is set on a user.

 o  Tim Beale <[email protected]>
    * BUG 13434: CVE-2018-10919: acl_read: Fix unauthorized attribute
 access via
      searches.

 o  Günther Deschner <[email protected]>
    * BUG 13360: CVE-2018-1139 libcli/auth: Do not allow ntlmv1 over SMB1
 when it
      is disabled via "ntlm auth".

 o  Andrej Gessel <[email protected]>
    * BUG 13374: CVE-2018-1140 Add NULL check for ldb_dn_get_casefold() in
      ltdb_index_dn_attr().
 }}}

--

Comment:

 {{{
  =============================
                    Release Notes for Samba 4.8.4
                            August 14, 2018
                    =============================


 This is a security release in order to address the following defects:

 o  CVE-2018-1139  (Weak authentication protocol allowed.)
 o  CVE-2018-1140  (Denial of Service Attack on DNS and LDAP server.)
 o  CVE-2018-10858 (Insufficient input validation on client directory
                    listing in libsmbclient.)
 o  CVE-2018-10918 (Denial of Service Attack on AD DC DRSUAPI server.)
 o  CVE-2018-10919 (Confidential attribute disclosure from the AD LDAP
                    server.)


 =======
 Details
 =======

 o  CVE-2018-1139:
    Vulnerability that allows authentication via NTLMv1 even if disabled.

 o  CVE-2018-1140:
    Missing null pointer checks may crash the Samba AD DC, both over
    DNS and LDAP.

 o  CVE-2018-10858:
    A malicious server could return a directory entry that could corrupt
    libsmbclient memory.

 o  CVE-2018-10918:
    Missing null pointer checks may crash the Samba AD DC, over the
    authenticated DRSUAPI RPC service.

 o  CVE-2018-10919:
    Missing access control checks allow discovery of confidential attribute
    values via authenticated LDAP search expressions.


 Changes since 4.8.3:
 --------------------

 o  Jeremy Allison <[email protected]>
    * BUG 13453: CVE-2018-10858: libsmb: Harden smbc_readdir_internal()
 against
      returns from malicious servers.

 o  Andrew Bartlett <[email protected]>
    * BUG 13374: CVE-2018-1140: ldbsearch '(distinguishedName=abc)' and DNS
 query
      with escapes crashes, ldb: Release LDB 1.3.5 for CVE-2018-1140
    * BUG 13552: CVE-2018-10918: cracknames: Fix DoS (NULL pointer de-ref)
 when
      not servicePrincipalName is set on a user.

 o  Tim Beale <[email protected]>
    * BUG 13434: CVE-2018-10919: acl_read: Fix unauthorized attribute
 access via
      searches.

 o  Günther Deschner <[email protected]>
    * BUG 13360: CVE-2018-1139 libcli/auth: Do not allow ntlmv1 over SMB1
 when it
      is disabled via "ntlm auth".

 o  Andrej Gessel <[email protected]>
    * BUG 13374: CVE-2018-1140 Add NULL check for ldb_dn_get_casefold() in
      ltdb_index_dn_attr().
 }}}

 Allows authentication over NTLMv1 even if it is disabled, crashes / memory
 corruption, and failure to verify access control checks.

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/11021#comment:1>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to