CVE-2019-14907

All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/
https://security.gentoo.org/glsa/202003-52 Third Party Advisory
https://security.netapp.com/advisory/ntap-20200122-0001/ Third Party Advisory
https://usn.ubuntu.com/4244-1/ Third Party Advisory
https://www.samba.org/samba/security/CVE-2019-14907.html Vendor Advisory
https://www.synology.com/security/advisory/Synology_SA_20_01 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html Third Party Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907 Issue Tracking Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/
https://security.gentoo.org/glsa/202003-52 Third Party Advisory
https://security.netapp.com/advisory/ntap-20200122-0001/ Third Party Advisory
https://usn.ubuntu.com/4244-1/ Third Party Advisory
https://www.samba.org/samba/security/CVE-2019-14907.html Vendor Advisory
https://www.synology.com/security/advisory/Synology_SA_20_01 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:synology:directory_server:-:*:*:*:*:*:*:*
cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*
cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*
cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

14 Jan 2025, 19:29

Type Values Removed Values Added
CPE cpe:2.3:a:synology:diskstation_manager:6.2:*:*:*:*:*:*:* cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*

21 Nov 2024, 04:27

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html - Third Party Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907 - Issue Tracking, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907 - Issue Tracking, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html - () https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/ -
References () https://security.gentoo.org/glsa/202003-52 - Third Party Advisory () https://security.gentoo.org/glsa/202003-52 - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20200122-0001/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20200122-0001/ - Third Party Advisory
References () https://usn.ubuntu.com/4244-1/ - Third Party Advisory () https://usn.ubuntu.com/4244-1/ - Third Party Advisory
References () https://www.samba.org/samba/security/CVE-2019-14907.html - Vendor Advisory () https://www.samba.org/samba/security/CVE-2019-14907.html - Vendor Advisory
References () https://www.synology.com/security/advisory/Synology_SA_20_01 - Third Party Advisory () https://www.synology.com/security/advisory/Synology_SA_20_01 - Third Party Advisory

29 May 2021, 13:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html -

Information

Published : 2020-01-21 18:15

Updated : 2025-01-14 19:29


NVD link : CVE-2019-14907

Mitre link : CVE-2019-14907

CVE.ORG link : CVE-2019-14907


JSON object : View

Products Affected

redhat

  • storage
  • enterprise_linux

synology

  • diskstation_manager
  • directory_server
  • router_manager
  • skynas

samba

  • samba

debian

  • debian_linux

fedoraproject

  • fedora

canonical

  • ubuntu_linux
CWE
CWE-125

Out-of-bounds Read