{"id":"CVE-2018-1050","details":"All versions of Samba from 4.0.0 onwards are vulnerable to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon. Missing input sanitization checks on some of the input parameters to spoolss RPC calls could cause the print spooler service to crash.","modified":"2026-03-20T11:22:56.155482Z","published":"2018-03-13T16:29:00.210Z","related":["MGASA-2018-0201","SUSE-SU-2018:0754-1","SUSE-SU-2018:0774-1","SUSE-SU-2018:0832-1","SUSE-SU-2018:2321-1","SUSE-SU-2018:2339-1","SUSE-SU-2018:2339-2","openSUSE-SU-2024:11365-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2612"},{"type":"ADVISORY","url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/103387"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1860"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201805-07"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180313-0001/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3595-2/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1883"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2613"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:3056"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/03/msg00024.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3595-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4135"},{"type":"ADVISORY","url":"https://www.samba.org/samba/security/CVE-2018-1050.html"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1040493"},{"type":"ADVISORY","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03834en_us"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1538771"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samba-team/samba","events":[{"introduced":"b1d9ddf738c6e59e489bc9c339ce6de5988b689e"},{"fixed":"4b43ad87039c0e94522b2baa7381255e28935f4e"},{"introduced":"f17816a4ae2bb0ed45561347a4c578ca9ab28ccf"},{"fixed":"d64e68abdb0c468467b6ea480dd2ede8c0315374"},{"introduced":"d1e69845e28c20a491c4cd60c712b46ddfcb9dc0"},{"fixed":"5cfa947e5098bc361ff13fdad1b4fe3211a39154"}],"database_specific":{"versions":[{"introduced":"3.6.0"},{"fixed":"4.5.16"},{"introduced":"4.6.0"},{"fixed":"4.6.14"},{"introduced":"4.7.0"},{"fixed":"4.7.6"}]}}],"versions":["ldb-1.2.3","samba-4.6.0","samba-4.6.1","samba-4.6.10","samba-4.6.11","samba-4.6.12","samba-4.6.13","samba-4.6.2","samba-4.6.3","samba-4.6.4","samba-4.6.5","samba-4.6.6","samba-4.6.7","samba-4.6.8","samba-4.6.9","samba-4.7.0","samba-4.7.1","samba-4.7.2","samba-4.7.3","samba-4.7.4","samba-4.7.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-1050.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"17.10"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}