{"id":"CVE-2019-14907","details":"All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with \"log level = 3\" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).","modified":"2026-04-16T01:44:02.173258635Z","published":"2020-01-21T18:15:12.717Z","related":["SUSE-SU-2020:0152-1","SUSE-SU-2020:0223-1","SUSE-SU-2020:0224-1","SUSE-SU-2020:0233-1","SUSE-SU-2020:2673-1","openSUSE-SU-2020:0122-1","openSUSE-SU-2024:11365-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-52"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20200122-0001/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/4244-1/"},{"type":"ADVISORY","url":"https://www.samba.org/samba/security/CVE-2019-14907.html"},{"type":"ADVISORY","url":"https://www.synology.com/security/advisory/Synology_SA_20_01"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samba-team/samba","events":[{"introduced":"25f2fe02a615e2cf906b6fa495acd8ea0aa9998a"},{"fixed":"06f7473fe565b3e2fd9413cbdcc77439d9907735"},{"introduced":"4fc4ae2924aaa2fc184b7385069274526fa8a4c2"},{"fixed":"5f8ef2f9eecbc6c6c405bdb55ed685ad83008c11"},{"introduced":"d60cf580825819f11de9e50ec4c4ce591d695ad9"},{"fixed":"01a4dd8ea2b7503270221beef02d21b0a2bc5ffa"}]}],"versions":["ldb-1.4.3","ldb-1.4.4","ldb-1.4.5","ldb-1.4.6","ldb-1.4.7","ldb-1.4.8","ldb-1.5.5","ldb-1.5.6","ldb-2.0.8","samba-4.10.0","samba-4.10.1","samba-4.10.10","samba-4.10.11","samba-4.10.2","samba-4.10.3","samba-4.10.4","samba-4.10.5","samba-4.10.6","samba-4.10.7","samba-4.10.8","samba-4.10.9","samba-4.11.0","samba-4.11.1","samba-4.11.2","samba-4.11.3","samba-4.11.4","samba-4.9.0","samba-4.9.1","samba-4.9.10","samba-4.9.11","samba-4.9.12","samba-4.9.13","samba-4.9.14","samba-4.9.15","samba-4.9.16","samba-4.9.17","samba-4.9.2","samba-4.9.3","samba-4.9.4","samba-4.9.5","samba-4.9.6","samba-4.9.7","samba-4.9.8","samba-4.9.9"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-14907.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}]}