A denial of service vulnerability was discovered in Samba's LDAP server before versions 4.7.12, 4.8.7, and 4.9.3. A CNAME loop could lead to infinite recursion in the server. An unprivileged local attacker could create such an entry, leading to denial of service.
The product does not properly control the allocation and maintenance of a limited resource.
The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.
Link | Tags |
---|---|
https://usn.ubuntu.com/3827-2/ | third party advisory vendor advisory |
https://usn.ubuntu.com/3827-1/ | third party advisory vendor advisory |
http://www.securityfocus.com/bid/106022 | vdb entry third party advisory |
https://security.netapp.com/advisory/ntap-20181127-0001/ | third party advisory |
https://lists.debian.org/debian-lts-announce/2018/12/msg00005.html | third party advisory mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14629 | issue tracking exploit third party advisory |
https://www.debian.org/security/2018/dsa-4345 | third party advisory vendor advisory |
https://www.samba.org/samba/security/CVE-2018-14629.html | patch vendor advisory |
https://security.gentoo.org/glsa/202003-52 | vendor advisory |