Red Hat Bugzilla – Bug 1610640
CVE-2018-10918 samba: DsCrackNames on a user without an SPN can trigger NULL-pointer de-reference
Last modified: 2018-09-25 23:39:56 EDT
As per upstream advisory: All versions of Samba from 4.7.0 onwards are vulnerable to a denial of service attack which can crash the "samba" process when Samba is an Active Directory Domain Controller. Missing database output checks on the returned directory attributes from the LDB database layer cause the DsCrackNames call in the DRSUAPI server to crash when following a NULL pointer. This call is only available after authentication. There is no further vulnerability associated with this error, merely a denial of service.
External Reference: https://www.samba.org/samba/security/CVE-2018-10918.html
Created samba tracking bugs for this issue: Affects: fedora-all [bug 1617910]
Acknowledgments: Name: Volker Mauel (the Samba project)