Double Free Affecting samba package, versions [4.3.0,4.7.12)[4.8.0,4.8.7)[4.8.8,4.9.3)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.87% (83rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-SAMBA-2370529
  • published26 Jan 2022
  • disclosed28 Nov 2018
  • creditUnknown

Introduced: 28 Nov 2018

CVE-2018-16841  (opens in a new tab)
CWE-415  (opens in a new tab)

How to fix?

Upgrade samba to version 4.7.12, 4.8.7, 4.9.3 or higher.

Overview

Affected versions of this package are vulnerable to Double Free. Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba's KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with talloc_free() and directly calls abort(), terminating the KDC process.

References

CVSS Scores

version 3.1