CVE-2018-1050

Name
CVE-2018-1050
Description
All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Mitigation https://www.samba.org/samba/security/CVE-2018-1050.html
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=1538771
Third Party Advisory https://www.debian.org/security/2018/dsa-4135
Third Party Advisory https://security.netapp.com/advisory/ntap-20180313-0001/
Third Party Advisory http://www.securitytracker.com/id/1040493
Third Party Advisory http://www.securityfocus.com/bid/103387
Third Party Advisory https://usn.ubuntu.com/3595-1/
Third Party Advisory https://usn.ubuntu.com/3595-2/
Mailing List https://lists.debian.org/debian-lts-announce/2018/03/msg00024.html
Third Party Advisory https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03834en_us
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1883
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:1860
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:2613
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:2612
Third Party Advisory https://security.gentoo.org/glsa/201805-07
Third Party Advisory https://access.redhat.com/errata/RHSA-2018:3056
Third Party Advisory https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
Mailing List https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:lts:*:*:* ubuntu_linux == None == 17.10
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* ubuntu_linux == None == 14.04
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* ubuntu_linux == None == 16.04
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:* ubuntu_linux == None == 12.04

Vulnerable and fixed packages

Source package Branch Version Maintainer Status