CVE-2019-14907

Source
https://cve.org/CVERecord?id=CVE-2019-14907
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-14907.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2019-14907
Downstream
Related
Published
2020-01-21T18:15:12.717Z
Modified
2026-05-18T05:50:38.458129994Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).

Database specific
{
    "unresolved_ranges": [
        {
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "16.04"
                },
                {
                    "last_affected": "18.04"
                },
                {
                    "last_affected": "19.04"
                },
                {
                    "last_affected": "19.10"
                }
            ],
            "cpes": [
                "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
                "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
                "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
                "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*"
            ],
            "vendor_product": "canonical:ubuntu_linux"
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "9.0"
                }
            ],
            "vendor_product": "debian:debian_linux"
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
                "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "30"
                },
                {
                    "last_affected": "31"
                }
            ],
            "vendor_product": "fedoraproject:fedora"
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
                "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "7.0"
                },
                {
                    "last_affected": "8.0"
                }
            ],
            "vendor_product": "redhat:enterprise_linux"
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "3.0"
                }
            ],
            "vendor_product": "redhat:storage"
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "6.2"
                }
            ],
            "vendor_product": "synology:diskstation_manager"
        },
        {
            "source": "CPE_FIELD",
            "cpes": [
                "cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*"
            ],
            "extracted_events": [
                {
                    "last_affected": "1.2"
                }
            ],
            "vendor_product": "synology:router_manager"
        }
    ]
}
References

Affected packages

Git / github.com/samba-team/samba

Affected ranges

Type
GIT
Repo
https://github.com/samba-team/samba
Events
Database specific
{
    "cpe": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
    "source": "CPE_FIELD",
    "extracted_events": [
        {
            "introduced": "4.9.0"
        },
        {
            "fixed": "4.9.18"
        },
        {
            "introduced": "4.10.0"
        },
        {
            "fixed": "4.10.12"
        },
        {
            "introduced": "4.11.0"
        },
        {
            "fixed": "4.11.5"
        }
    ]
}

Affected versions

ldb-1.*
ldb-1.4.3
ldb-1.4.4
ldb-1.4.5
ldb-1.4.6
ldb-1.4.7
ldb-1.4.8
ldb-1.5.5
ldb-1.5.6
ldb-2.*
ldb-2.0.8
samba-4.*
samba-4.10.0
samba-4.10.1
samba-4.10.10
samba-4.10.11
samba-4.10.6
samba-4.10.7
samba-4.10.9
samba-4.11.0
samba-4.11.1
samba-4.11.4
samba-4.9.0
samba-4.9.1
samba-4.9.10
samba-4.9.11
samba-4.9.12
samba-4.9.14
samba-4.9.16
samba-4.9.17
samba-4.9.2
samba-4.9.4
samba-4.9.5
samba-4.9.7

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-14907.json"