CVE-2018-14629.html:

====================================================================
== Subject:     Unprivileged adding of CNAME record causing loop
==              in AD Internal DNS server
==
== CVE ID#:     CVE-2018-14629
==
== Versions:    All versions of Samba from 4.0.0 onwards.
==
== Summary:     CNAME loops can cause DNS server crashes, and CNAMEs
==              can be added by unprivileged users.
==
====================================================================

===========
Description
===========

All versions of Samba from 4.0.0 onwards are vulnerable to infinite
query recursion caused by CNAME loops. Any dns record can be added via
ldap by an unprivileged user using the ldbadd tool, so this is a
security issue.

==================
Patch Availability
==================

Patches addressing both these issues have been posted to:

    http://www.samba.org/samba/security/

Additionally, Samba 4.7.12, 4.8.7, and 4.9.3 have been issued as
security releases to correct the defect. Samba administrators are
advised to upgrade to these releases or apply the patch as soon as
possible.

==================
CVSSv3 calculation
==================

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H (6.5)

==========
Workaround
==========

The Samba AD DC can be configured to use BIND9 for DNS.

This is done by running 
 samba_upgradedns --dns-backend=BIND9_DLZ
and then disabling the 'dns' service in the smb.conf (eg 'server services =
-dns)

=======
Credits
=======

The initial bug was found by Florian Stülpner

Aaron Haslett of Catalyst did the investigation and wrote the patch.