Lucene search

K
altlinuxHttps://packages.altlinux.org/en/sisyphus/security/20CA683D2CF97ADF91AB3B432668CB10
HistoryNov 07, 2021 - 12:00 a.m.

Security fix for the ALT Linux 10 package samba version 4.14.10-alt1

2021-11-0700:00:00
https://packages.altlinux.org/en/sisyphus/security/
packages.altlinux.org
10

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

53.7%

Nov. 7, 2021 Evgeny Sinelnikov 4.14.10-alt1

- Update to latest security release of Samba 4.14
- Security fixes:
  + CVE-2016-2124:  SMB1 client connections can be downgraded to plaintext
                    authentication.
                    https://www.samba.org/samba/security/CVE-2016-2124.html
  + CVE-2020-25717: A user on the domain can become root on domain members.
                    https://www.samba.org/samba/security/CVE-2020-25717.html
  + CVE-2020-25718: Samba AD DC did not correctly sandbox Kerberos tickets
                    issued by an RODC.
                    https://www.samba.org/samba/security/CVE-2020-25718.html
  + CVE-2020-25719: Samba AD DC did not always rely on the SID and PAC in
                    Kerberos tickets.
                    https://www.samba.org/samba/security/CVE-2020-25719.html
  + CVE-2020-25721: Kerberos acceptors need easy access to stable AD identifiers
                    (eg objectSid).
                    https://www.samba.org/samba/security/CVE-2020-25721.html
  + CVE-2020-25722: Samba AD DC did not do suffienct access and conformance
                    checking of data stored.
                    https://www.samba.org/samba/security/CVE-2020-25722.html
  + CVE-2021-3738:  Use after free in Samba AD DC RPC server.
                    https://www.samba.org/samba/security/CVE-2021-3738.html
  + CVE-2021-23192: Subsequent DCE/RPC fragment injection vulnerability.
                    https://www.samba.org/samba/security/CVE-2021-23192.html

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

53.7%