==================================================================== == Subject: Denial of Service Attack on DNS and LDAP server == == CVE ID#: CVE-2018-1140 == == Versions: All versions of Samba from 4.8.0 onwards. == == Summary: Missing null pointer checks may crash the Samba AD == DC, both over DNS and LDAP == ==================================================================== =========== Description =========== All versions of Samba from 4.8.0 onwards are vulnerable to a denial of service attack when Samba is an Active Directory Domain Controller. Missing input sanitization checks on some of the input parameters to LDB database layer cause the print spooler service to crash when following a NULL pointer. There is no further vulnerability associated with this error, merely a denial of service. ================== Patch Availability ================== A patch addressing this defect has been posted to http://www.samba.org/samba/security/ Additionally, Samba 4.8.4, has been issued as a security release to correct the defect. Patches against older Samba versions are available at http://samba.org/samba/patches/. Samba vendors and administrators running affected versions are advised to upgrade or apply the patch as soon as possible. ========== Workaround ========== No workaround is possible while acting as a Samba AD DC. Disabling the 'dns' and 'ldap' services in the smb.conf (eg 'server services = -dns -ldap) would remove essential elements in the AD DC. The use of BIND9_DLZ (loading a DLZ .so for LDB database access into the BIND 9 DNS server) is subject to the same issue. ======= Credits ======= The initial bugs were found by the Laurent Debomy (DNS) and Andrej Gessel (LDB). Kai Blin of the Samba Team, Garming Sam of Catalyst and the Samba Team and Andrew Bartlett of Catalyst and the Samba Team did the investigation and provided the final fix.