All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2020-01-21T00:00:00

Updated: 2024-08-05T00:34:52.321Z

Reserved: 2019-08-10T00:00:00

Link: CVE-2019-14907

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-01-21T18:15:12.717

Modified: 2023-11-07T03:05:22.540

Link: CVE-2019-14907

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-01-21T00:00:00Z

Links: CVE-2019-14907 - Bugzilla