4.3

CVE-2018-1050

All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.

Data is provided by the National Vulnerability Database (NVD)
CanonicalUbuntu Linux Version12.04 SwEditionesm
CanonicalUbuntu Linux Version14.04 SwEditionlts
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version17.10 SwEditionlts
SambaSamba Version >= 3.6.0 < 4.5.16
SambaSamba Version >= 4.6.0 < 4.6.14
SambaSamba Version >= 4.7.0 < 4.7.6
DebianDebian Linux Version7.0
DebianDebian Linux Version8.0
DebianDebian Linux Version9.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 27.18% 0.962
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 2.8 1.4
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
nvd@nist.gov 3.3 6.5 2.9
AV:A/AC:L/Au:N/C:N/I:N/A:P
CWE-476 NULL Pointer Dereference

The product dereferences a pointer that it expects to be valid but is NULL.

http://www.securityfocus.com/bid/103387
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040493
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1538771
Third Party Advisory
Issue Tracking
https://usn.ubuntu.com/3595-1/
Third Party Advisory
https://usn.ubuntu.com/3595-2/
Third Party Advisory