CVE Vulnerabilities

CVE-2021-3671

NULL Pointer Dereference

Published: Oct 12, 2021 | Modified: Nov 21, 2024
CVSS 3.x
6.5
MEDIUM
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4 MEDIUM
AV:N/AC:L/Au:S/C:N/I:N/A:P
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
SambaSamba*4.13.12 (excluding)
SambaSamba4.14.0 (including)4.14.8 (excluding)
HeimdalUbuntubionic*
HeimdalUbuntuesm-infra-legacy/trusty*
HeimdalUbuntuesm-infra/bionic*
HeimdalUbuntuesm-infra/focal*
HeimdalUbuntuesm-infra/xenial*
HeimdalUbuntufocal*
HeimdalUbuntuhirsute*
HeimdalUbuntuimpish*
HeimdalUbuntutrusty*
HeimdalUbuntutrusty/esm*
HeimdalUbuntuupstream*
HeimdalUbuntuxenial*
SambaUbuntubionic*
SambaUbuntudevel*
SambaUbuntuesm-infra-legacy/trusty*
SambaUbuntuesm-infra/bionic*
SambaUbuntuesm-infra/focal*
SambaUbuntuesm-infra/xenial*
SambaUbuntufocal*
SambaUbuntuhirsute*
SambaUbuntuimpish*
SambaUbuntujammy*
SambaUbuntukinetic*
SambaUbuntulunar*
SambaUbuntumantic*
SambaUbuntunoble*
SambaUbuntuoracular*
SambaUbuntuplucky*
SambaUbuntuquesting*
SambaUbuntutrusty*
SambaUbuntutrusty/esm*
SambaUbuntuupstream*
SambaUbuntuxenial*

Potential Mitigations

References