CVE-2019-14833

Name
CVE-2019-14833
Description
A flaw was found in Samba, all versions starting samba 4.5.0 before samba 4.9.15, samba 4.10.10, samba 4.11.2, in the way it handles a user password change or a new password for a samba user. The Samba Active Directory Domain Controller can be configured to use a custom script to check for password complexity. This configuration can fail to verify password complexity when non-ASCII characters are used in the password, which could lead to weak passwords being set for samba users, making it vulnerable to dictionary attacks.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Issue Tracking https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833
Mitigation https://www.samba.org/samba/security/CVE-2019-14833.html
Third Party Advisory http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
CONFIRM https://www.synology.com/security/advisory/Synology_SA_19_35
MLIST https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* samba >= 4.5.0 < 4.9.15
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* samba >= 4.11.0 < 4.11.2
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:* samba >= 4.10.0 < 4.10.10

Vulnerable and fixed packages

Source package Branch Version Maintainer Status