Vulnerability Description
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Samba | Samba | >= 4.9.0, < 4.9.18 |
| Fedoraproject | Fedora | 30 |
| Redhat | Storage | 3.0 |
| Redhat | Enterprise Linux | 7.0 |
| Canonical | Ubuntu Linux | 16.04 |
| Synology | Directory Server | - |
| Synology | Router Manager | 1.2 |
| Synology | Skynas | - |
| Synology | Diskstation Manager | 6.2 |
| Debian | Debian Linux | 9.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.htmlThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/05/msg00023.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedorapro
- https://security.gentoo.org/glsa/202003-52Third Party Advisory
- https://security.netapp.com/advisory/ntap-20200122-0001/Third Party Advisory
- https://usn.ubuntu.com/4244-1/Third Party Advisory
- https://www.samba.org/samba/security/CVE-2019-14907.htmlVendor Advisory
- https://www.synology.com/security/advisory/Synology_SA_20_01Third Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.htmlThird Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907Issue TrackingThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2021/05/msg00023.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
FAQ
What is CVE-2019-14907?
CVE-2019-14907 is a vulnerability with a CVSS score of 6.5 (MEDIUM). All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after ...
How severe is CVE-2019-14907?
CVE-2019-14907 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-14907?
Check the references section above for vendor advisories and patch information. Affected products include: Samba Samba, Fedoraproject Fedora, Redhat Storage, Redhat Enterprise Linux, Canonical Ubuntu Linux.