Vulnerability Details : CVE-2018-1050
All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.
Vulnerability category: Denial of service
Products affected by CVE-2018-1050
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:lts:*:*:*
Threat overview for CVE-2018-1050
Top countries where our scanners detected CVE-2018-1050
Top open port discovered on systems with this issue
445
IPs affected by CVE-2018-1050 174,278
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2018-1050!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2018-1050
2.41%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-1050
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.3
|
LOW | AV:A/AC:L/Au:N/C:N/I:N/A:P |
6.5
|
2.9
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
2.8
|
1.4
|
NIST |
CWE ids for CVE-2018-1050
-
The product dereferences a pointer that it expects to be valid but is NULL.Assigned by:
- nvd@nist.gov (Primary)
- secalert@redhat.com (Secondary)
References for CVE-2018-1050
-
http://www.securityfocus.com/bid/103387
Samba CVE-2018-1050 Remote Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://www.samba.org/samba/security/CVE-2018-1050.html
Samba - Security Announcement ArchiveMitigation;Vendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1538771
1538771 – (CVE-2018-1050) CVE-2018-1050 samba: NULL pointer dereference in printer server processIssue Tracking;Third Party Advisory
-
https://usn.ubuntu.com/3595-2/
USN-3595-2: Samba vulnerability | Ubuntu security noticesThird Party Advisory
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03834en_us
Under maintenance - HPE Support CenterThird Party Advisory
-
https://www.debian.org/security/2018/dsa-4135
Debian -- Security Information -- DSA-4135-1 sambaThird Party Advisory
-
https://usn.ubuntu.com/3595-1/
USN-3595-1: Samba vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://security.netapp.com/advisory/ntap-20180313-0001/
March 2018 Samba Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2612
RHSA-2018:2612 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:1883
RHSA-2018:1883 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2613
RHSA-2018:2613 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:3056
RHSA-2018:3056 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
Security fixes in StruxureWare Data Center Expert v7.6.0 - User assistance for StruxureWare Data Center Expert 7.x - Help Center: Support for EcoStruxure IT, StruxureWare for Data Centers, and NetBotzThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:1860
RHSA-2018:1860 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/201805-07
Samba: Multiple vulnerabilities (GLSA 201805-07) — Gentoo securityThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/03/msg00024.html
[SECURITY] [DLA 1320-1] samba security updateMailing List;Third Party Advisory
-
http://www.securitytracker.com/id/1040493
Samba Input Validation Flaw Lets Remote Users Cause the Target Print Spooler Service to Crash - SecurityTrackerThird Party Advisory;VDB Entry
-
https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html
[SECURITY] [DLA 1754-1] samba security updateMailing List;Third Party Advisory
Jump to