Arch Linux 802 Published by

The following updates has been released for Arch Linux:

ASA-201811-21: powerdns-recursor: denial of service
ASA-201811-22: samba: multiple issues



ASA-201811-21: powerdns-recursor: denial of service


Arch Linux Security Advisory ASA-201811-21
==========================================

Severity: Medium
Date : 2018-11-28
CVE-ID : CVE-2018-16855
Package : powerdns-recursor
Type : denial of service
Remote : Yes
Link : https://security.archlinux.org/AVG-821

Summary
=======

The package powerdns-recursor before version 4.1.8-1 is vulnerable to
denial of service.

Resolution
==========

Upgrade to 4.1.8-1.

# pacman -Syu "powerdns-recursor>=4.1.8-1"

The problem has been fixed upstream in version 4.1.8.

Workaround
==========

None.

Description
===========

An issue has been found in PowerDNS Recursor versions from 4.1.0 up to
and including 4.1.7, where a remote attacker sending a DNS query can
trigger an out-of-bounds memory read while computing the hash of the
query for a packet cache lookup, possibly leading to a crash.

Impact
======

A remote attacker can cause a denial of service via a crafted query.

References
==========

https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2018-09.html
https://seclists.org/oss-sec/2018/q4/183
https://github.com/PowerDNS/pdns/commit/e412a949491886c13854587bbd06fa90ceb3a326
https://security.archlinux.org/CVE-2018-16855

ASA-201811-22: samba: multiple issues


Arch Linux Security Advisory ASA-201811-22
==========================================

Severity: High
Date : 2018-11-28
CVE-ID : CVE-2018-14629 CVE-2018-16841 CVE-2018-16851 CVE-2018-16852
CVE-2018-16853 CVE-2018-16857
Package : samba
Type : multiple issues
Remote : Yes
Link : https://security.archlinux.org/AVG-823

Summary
=======

The package samba before version 4.9.3-1 is vulnerable to multiple
issues including denial of service and access restriction bypass.

Resolution
==========

Upgrade to 4.9.3-1.

# pacman -Syu "samba>=4.9.3-1"

The problems have been fixed upstream in version 4.9.3.

Workaround
==========

None.

Description
===========

- CVE-2018-14629 (denial of service)

A denial of service security issue has been found in samba from 4.0.0
up to and including 4.9.2, where an unprivileged user can use the
ldbadd tool to add DNS records to create a CNAME loop, causing infinite
query recursion.

- CVE-2018-16841 (denial of service)

A double-free issue has been found in samba from 4.3.0 up to and
including 4.9.2, where a user with a valid certificate or smart card
can crash the Samba AD DC's KDC.
When configured to accept smart-card authentication, Samba's KDC
willcall talloc_free() twice on the same memory if the principal in a
validly signed certificate does not match the principal in the AS-REQ.
This is only possible after authentication with a trusted certificate.
talloc is robust against further corruption from a double-free with
talloc_free() and directly calls abort(), terminating the KDC process.
There is no further vulnerability associated with this issue, merely a
denial of service.

- CVE-2018-16851 (denial of service)

A NULL pointer de-reference issue has been found in samba from 4.0.0 up
to and including 4.9.2, where a user able to read more than 256MB of
LDAP entries can crash the Samba AD DC's LDAP server.

- CVE-2018-16852 (denial of service)

A NULL pointer de-reference issue has been found in samba from 4.9.0 up
to and including 4.9.2, where a user able to create or modify dnsZone
objects can crash the Samba AD DC's DNS management RPC server, DNS
server or BIND9 when using Samba's DLZ plugin

- CVE-2018-16853 (denial of service)

A denial of service has been found in samba from 4.7.0 up to and
including 4.9.2, where a user in a Samba AD domain can crash the MIT
KDC by requesting an S4U2Self ticket. This only happens if Samba is
build in a experimental and unsupported MIT Kerberos configuration.

- CVE-2018-16857 (access restriction bypass)

A security issue has been found in samba from 4.9.0 up to and including
4.9.2, where AD DC Configurations watching for bad passwords to
restrict brute forcing in a window of more than 3 minutes may not watch
for bad passwords at all.

Impact
======

A remote authenticated user can crash a vulnerable samba server. A
remote attacker can brute-force passwords without triggering the bad
password lockout protection.

References
==========

https://download.samba.org/pub/samba/patches/security/samba-4.9.2-security-2018-11-27.patch
https://www.samba.org/samba/security/CVE-2018-14629.html
https://bugzilla.samba.org/show_bug.cgi?id=13600
https://github.com/samba-team/samba/commit/bf596c14c2462b9a15ea738ef4f32b3abb8b63d1
https://www.samba.org/samba/security/CVE-2018-16841.html
https://bugzilla.samba.org/show_bug.cgi?id=13628
https://github.com/samba-team/samba/commit/6e84215d4aa7ef51096db3b187adbe22cacdd921
https://www.samba.org/samba/security/CVE-2018-16851.html
https://bugzilla.samba.org/show_bug.cgi?id=13674
https://github.com/samba-team/samba/commit/f33f52c366f7cf140f470de44579dcb7eb832629
https://www.samba.org/samba/security/CVE-2018-16852.html
https://bugzilla.samba.org/show_bug.cgi?id=13669
https://github.com/samba-team/samba/commit/05f867db81f118215445f2c49eda4b9c3451d14a
https://github.com/samba-team/samba/commit/c78ca8b9b48a19e71f4d6ddd2e300f282fb0b247
https://www.samba.org/samba/security/CVE-2018-16853.html
https://bugzilla.samba.org/show_bug.cgi?id=13571
https://github.com/samba-team/samba/commit/4aabfecd290cd2769376abf7f170e832becc4112
https://www.samba.org/samba/security/CVE-2018-16857.html
https://bugzilla.samba.org/show_bug.cgi?id=13683
https://github.com/samba-team/samba/commit/862d4909eccd18942e3de8e8b0dc6e1594ec27f1
https://github.com/samba-team/samba/commit/4f86beeaf3408383385ee99a74520a805dd63c0f
https://github.com/samba-team/samba/commit/d12b02c78842786969557b9be7c953e9594d90d
https://github.com/samba-team/samba/commit/60b2cd50f4d0554cc5ca8c53b2d1fa89e56a6d06
https://security.archlinux.org/CVE-2018-14629
https://security.archlinux.org/CVE-2018-16841
https://security.archlinux.org/CVE-2018-16851
https://security.archlinux.org/CVE-2018-16852
https://security.archlinux.org/CVE-2018-16853
https://security.archlinux.org/CVE-2018-16857