Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2018-1050
HistoryMar 13, 2018 - 4:29 p.m.

CVE-2018-1050

2018-03-1316:29:00
Debian Security Bug Tracker
security-tracker.debian.org
22
samba
denial of service
rpc spoolss service
input sanitization
print spooler

CVSS2

3.3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:N/I:N/A:P

CVSS3

4.3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0.024

Percentile

90.1%

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

OSVersionArchitecturePackageVersionFilename
Debian12allsamba< 2:4.7.4+dfsg-2samba_2:4.7.4+dfsg-2_all.deb
Debian11allsamba< 2:4.7.4+dfsg-2samba_2:4.7.4+dfsg-2_all.deb
Debian999allsamba< 2:4.7.4+dfsg-2samba_2:4.7.4+dfsg-2_all.deb
Debian13allsamba< 2:4.7.4+dfsg-2samba_2:4.7.4+dfsg-2_all.deb

CVSS2

3.3

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:N/C:N/I:N/A:P

CVSS3

4.3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0.024

Percentile

90.1%