Bug 1160888 - (CVE-2019-14907) VUL-0: CVE-2019-14907: samba: server-side crash after charset conversion failure (eg during NTLMSSP processing)
(CVE-2019-14907)
VUL-0: CVE-2019-14907: samba: server-side crash after charset conversion fail...
Status: RESOLVED FIXED
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P3 - Medium : Normal
: ---
Assigned To: Novell Samba Team
Security Team bot
https://smash.suse.de/issue/250852/
CVSSv2:NVD:CVE-2019-14907:4.3:(AV:N/...
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2020-01-14 10:35 UTC by Marcus Meissner
Modified: 2020-09-17 19:15 UTC (History)
3 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Comment 1 Marcus Meissner 2020-01-14 10:36:19 UTC
CRD: 2020-01-21
Comment 2 Noel Power 2020-01-16 11:50:59 UTC
Just a quick question regarding SLE12 and submission for this bug
iiuc we don't need to submit this for SLE12-SP0/SP1/SP2/SP3 (as they are out of general support)

I am assuming submissions are only needed then for SLE12-SP4 & SLE12-SP5

if that is correct then currently SLE12-SP4 inherits samba from SLE12-SP3 so I just want clarify which SLE12-SP projects to submit too (e.g. for SP4 just submit to SP3 is enough?) and just to confirm we don't need SP0/SP1/SP2/SP3 unless specifically requested
Comment 3 Marcus Meissner 2020-01-16 14:49:20 UTC
SLES 12 SP4 inherits from SLES 12 SP3, so you would submit to SLES 12 SP3 for SP3+SP4 shipment.

SLES 12 SP5 has also samba sources at samba-4.10.5+git.129.35f7bb6e177.tar.bz2
Comment 7 Marcus Meissner 2020-01-21 11:02:54 UTC
is public

https://www.samba.org/samba/security/CVE-2019-14907.html


CVE-2019-14907.html

===========================================================
== Subject:     Crash after failed character conversion at
==              log level 3 or above
==
== CVE ID#:     CVE-2019-14907
==
== Versions:    Samba 4.0 and later versions
==
== Summary:     When processing untrusted string input Samba
==              can read past the end of the allocated buffer
==              when printing a "Conversion error" message
==              to the logs.
==              
===========================================================

===========
Description
===========

If samba is set with "log level = 3" (or above) then the string
obtained from the client, after a failed character conversion, is
printed.  Such strings can be provided during the NTLMSSP
authentication exchange.

In the Samba AD DC in particular, this may cause a long-lived process
(such as the RPC server) to terminate.  (In the file server case, the
most likely target, smbd, operates as process-per-client and so a
crash there is harmless).

==================
Patch Availability
==================

Patches addressing both these issues have been posted to:

    https://www.samba.org/samba/security/

Additionally, Samba 4.11.5, 4.10.12 and 4.9.18 have been issued
as security releases to correct the defect.  Samba administrators are
advised to upgrade to these releases or apply the patch as soon
as possible.

==================
CVSSv3 calculation
==================

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H (6.5)

==========
Workaround
==========

Do not set a log level of 3 or above in production.

=======
Credits
=======

Originally reported by Robert Święcki using a fuzzer he wrote.

Patches provided by Andrew Bartlett of the Samba team and Catalyst.

==========================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
==========================================================
Comment 8 Swamp Workflow Management 2020-01-21 20:22:51 UTC
SUSE-SU-2020:0152-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1160888
CVE References: CVE-2019-14907
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    samba-4.10.5+git.134.674d33703a6-3.3.1
SUSE Linux Enterprise Server 12-SP5 (src):    samba-4.10.5+git.134.674d33703a6-3.3.1
SUSE Linux Enterprise High Availability 12-SP5 (src):    samba-4.10.5+git.134.674d33703a6-3.3.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 10 Swamp Workflow Management 2020-01-23 20:11:36 UTC
SUSE-SU-2020:0223-1: An update that solves three vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1141320,1160850,1160852,1160888
CVE References: CVE-2019-14902,CVE-2019-14907,CVE-2019-19344
Sources used:
SUSE Linux Enterprise Module for Python2 15-SP1 (src):    samba-4.9.5+git.243.e76c5cb3d97-3.21.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15-SP1 (src):    samba-4.9.5+git.243.e76c5cb3d97-3.21.1
SUSE Linux Enterprise Module for Basesystem 15-SP1 (src):    samba-4.9.5+git.243.e76c5cb3d97-3.21.1
SUSE Linux Enterprise High Availability 15-SP1 (src):    samba-4.9.5+git.243.e76c5cb3d97-3.21.1
SUSE Enterprise Storage 6 (src):    samba-4.9.5+git.243.e76c5cb3d97-3.21.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Swamp Workflow Management 2020-01-23 20:12:31 UTC
SUSE-SU-2020:0224-1: An update that fixes two vulnerabilities is now available.

Category: security (moderate)
Bug References: 1160850,1160888
CVE References: CVE-2019-14902,CVE-2019-14907
Sources used:
SUSE Linux Enterprise Server for SAP 15 (src):    samba-4.7.11+git.218.58b95cbfc0f-4.37.1
SUSE Linux Enterprise Server 15-LTSS (src):    samba-4.7.11+git.218.58b95cbfc0f-4.37.1
SUSE Linux Enterprise Module for Packagehub Subpackages 15 (src):    samba-4.7.11+git.218.58b95cbfc0f-4.37.1
SUSE Linux Enterprise Module for Open Buildservice Development Tools 15 (src):    samba-4.7.11+git.218.58b95cbfc0f-4.37.1
SUSE Linux Enterprise Module for Basesystem 15 (src):    samba-4.7.11+git.218.58b95cbfc0f-4.37.1
SUSE Linux Enterprise High Performance Computing 15-LTSS (src):    samba-4.7.11+git.218.58b95cbfc0f-4.37.1
SUSE Linux Enterprise High Performance Computing 15-ESPOS (src):    samba-4.7.11+git.218.58b95cbfc0f-4.37.1
SUSE Linux Enterprise High Availability 15 (src):    samba-4.7.11+git.218.58b95cbfc0f-4.37.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Swamp Workflow Management 2020-01-24 20:23:28 UTC
SUSE-SU-2020:0233-1: An update that fixes one vulnerability is now available.

Category: security (moderate)
Bug References: 1160888
CVE References: CVE-2019-14907
Sources used:
SUSE OpenStack Cloud Crowbar 8 (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1
SUSE OpenStack Cloud 8 (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1
SUSE Linux Enterprise Software Development Kit 12-SP4 (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1
SUSE Linux Enterprise Server for SAP 12-SP3 (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1
SUSE Linux Enterprise Server 12-SP4 (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1
SUSE Linux Enterprise Server 12-SP3-LTSS (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1
SUSE Linux Enterprise Server 12-SP3-BCL (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1
SUSE Linux Enterprise High Availability 12-SP4 (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1
SUSE Linux Enterprise High Availability 12-SP3 (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1
SUSE Linux Enterprise Desktop 12-SP4 (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1
SUSE Enterprise Storage 5 (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1
HPE Helion Openstack 8 (src):    samba-4.6.16+git.174.c2fd2e28c84-3.49.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 13 Swamp Workflow Management 2020-01-29 05:11:26 UTC
openSUSE-SU-2020:0122-1: An update that solves three vulnerabilities and has one errata is now available.

Category: security (moderate)
Bug References: 1141320,1160850,1160852,1160888
CVE References: CVE-2019-14902,CVE-2019-14907,CVE-2019-19344
Sources used:
openSUSE Leap 15.1 (src):    samba-4.9.5+git.243.e76c5cb3d97-lp151.2.15.1
Comment 14 Marcus Meissner 2020-02-05 08:04:44 UTC
In SLE12 we do not include / support the Samba AD functionality.

Done
Comment 16 Swamp Workflow Management 2020-09-17 19:15:15 UTC
SUSE-SU-2020:2673-1: An update that fixes 15 vulnerabilities is now available.

Category: security (important)
Bug References: 1141267,1144902,1154289,1154598,1158108,1158109,1160850,1160852,1160888,1169850,1169851,1173159,1173160,1173359,1174120
CVE References: CVE-2019-10197,CVE-2019-10218,CVE-2019-14833,CVE-2019-14847,CVE-2019-14861,CVE-2019-14870,CVE-2019-14902,CVE-2019-14907,CVE-2019-19344,CVE-2020-10700,CVE-2020-10704,CVE-2020-10730,CVE-2020-10745,CVE-2020-10760,CVE-2020-14303
JIRA References: 
Sources used:
SUSE Linux Enterprise Software Development Kit 12-SP5 (src):    ldb-1.5.8-3.5.1, samba-4.10.17+git.203.862547088ca-3.14.1
SUSE Linux Enterprise Server 12-SP5 (src):    ldb-1.5.8-3.5.1, samba-4.10.17+git.203.862547088ca-3.14.1
SUSE Linux Enterprise High Availability 12-SP5 (src):    samba-4.10.17+git.203.862547088ca-3.14.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.