ASA-2018-00059 – Samba: NULL pointer de-reference in Samba AD DC DNS servers


Allele Security Alert

ASA-2018-00059

Identifier(s)

ASA-2018-00059, CVE-2018-16852

Title

NULL pointer de-reference in Samba AD DC DNS servers

Vendor(s)

Samba

Product(s)

Samba

Affected version(s)

All versions of Samba from 4.9.0 onwards

Fixed version(s)

Samba 4.9.3

Proof of concept

Unknown

Description

During the processing of an DNS zone in the DNS management DCE/RPC server, the internal DNS server or the Samba DLZ plugin for BIND9, if the DSPROPERTY_ZONE_MASTER_SERVERS property or DSPROPERTY_ZONE_SCAVENGING_SERVERS property is set, the server will follow a NULL pointer and terminate.

Technical details

Unknown

Credits

Fabrizio Faganello

Reference(s)

NULL pointer de-reference in Samba AD DC DNS servers
https://www.samba.org/samba/security/CVE-2018-16852.html

[Announce] Samba 4.9.3, 4.8.7 and 4.7.12 Security Releases Available
https://lists.samba.org/archive/samba-announce/2018/000462.html

CVE-2018-16852 dcerpc dnsserver: Verification tests
https://github.com/samba-team/samba/commit/c1d4033e09acd5f7edfbafaf04b3b410a5b8e574

CVE-2018-16852 dcerpc dnsserver: Ensure properties are handled correctly
https://github.com/samba-team/samba/commit/2b00f8fa9fdcecbd6951f09d528531c5585b9778

CVE-2018-16852 dcerpc dnsserver: refactor common properties handling
https://github.com/samba-team/samba/commit/9a12a001466b21cfb27cb77ee01b11d84bcb36b4

CVE-2018-16852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16852

CVE-2018-16852
https://nvd.nist.gov/vuln/detail/CVE-2018-16852

If there is any error in this alert or you wish a comprehensive analysis, let us know.

Last modified: December 4, 2018

We are not responsible for any data loss, device corruption or any other type of issue due to the use of any information mentioned in our security alerts.