CVE-2019-14907

Publication date 21 January 2020

Last updated 24 July 2024


Ubuntu priority

Cvss 3 Severity Score

6.5 · Medium

Score breakdown

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

Status

Package Ubuntu Release Status
samba 24.10 oracular
Fixed 2:4.11.5+dfsg-1ubuntu1
24.04 LTS noble
Fixed 2:4.11.5+dfsg-1ubuntu1
23.10 mantic
Fixed 2:4.11.5+dfsg-1ubuntu1
23.04 lunar
Fixed 2:4.11.5+dfsg-1ubuntu1
22.10 kinetic
Fixed 2:4.11.5+dfsg-1ubuntu1
22.04 LTS jammy
Fixed 2:4.11.5+dfsg-1ubuntu1
21.10 impish
Fixed 2:4.11.5+dfsg-1ubuntu1
21.04 hirsute
Fixed 2:4.11.5+dfsg-1ubuntu1
20.10 groovy
Fixed 2:4.11.5+dfsg-1ubuntu1
20.04 LTS focal
Fixed 2:4.11.5+dfsg-1ubuntu1
19.10 eoan
Fixed 2:4.10.7+dfsg-0ubuntu2.4
19.04 disco
Fixed 2:4.10.0+dfsg-0ubuntu2.8
18.04 LTS bionic
Fixed 2:4.7.6+dfsg~ubuntu-0ubuntu2.15
16.04 LTS xenial
Fixed 2:4.3.11+dfsg-0ubuntu0.16.04.25
14.04 LTS trusty Ignored end of ESM support, was needed

Severity score breakdown

Parameter Value
Base score 6.5 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

References

Related Ubuntu Security Notices (USN)

    • USN-4244-1
    • Samba vulnerabilities
    • 21 January 2020

Other references