7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
0.651 Medium
EPSS
Percentile
97.8%
CentOS Errata and Security Advisory CESA-2017:2789
Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
A race condition was found in samba server. A malicious samba client could use this flaw to access files and directories in areas of the server file system not exported under the share definitions. (CVE-2017-2619)
It was found that samba did not enforce “SMB signing” when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text. (CVE-2017-12150)
An information leak flaw was found in the way SMB1 protocol was implemented by Samba. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker. (CVE-2017-12163)
Red Hat would like to thank the Samba project for reporting CVE-2017-2619 and CVE-2017-12150 and Yihan Lian and Zhibin Hu (Qihoo 360 GearTeam), Stefan Metzmacher (SerNet), and Jeremy Allison (Google) for reporting CVE-2017-12163. Upstream acknowledges Jann Horn (Google) as the original reporter of CVE-2017-2619; and Stefan Metzmacher (SerNet) as the original reporter of CVE-2017-12150.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2017-September/084705.html
Affected packages:
libsmbclient
libsmbclient-devel
samba
samba-client
samba-common
samba-doc
samba-domainjoin-gui
samba-glusterfs
samba-swat
samba-winbind
samba-winbind-clients
samba-winbind-devel
samba-winbind-krb5-locator
Upstream details at:
https://access.redhat.com/errata/RHSA-2017:2789
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | libsmbclient | < 3.6.23-45.el6_9 | libsmbclient-3.6.23-45.el6_9.i686.rpm |
CentOS | 6 | i686 | libsmbclient-devel | < 3.6.23-45.el6_9 | libsmbclient-devel-3.6.23-45.el6_9.i686.rpm |
CentOS | 6 | i686 | samba | < 3.6.23-45.el6_9 | samba-3.6.23-45.el6_9.i686.rpm |
CentOS | 6 | i686 | samba-client | < 3.6.23-45.el6_9 | samba-client-3.6.23-45.el6_9.i686.rpm |
CentOS | 6 | i686 | samba-common | < 3.6.23-45.el6_9 | samba-common-3.6.23-45.el6_9.i686.rpm |
CentOS | 6 | i686 | samba-doc | < 3.6.23-45.el6_9 | samba-doc-3.6.23-45.el6_9.i686.rpm |
CentOS | 6 | i686 | samba-domainjoin-gui | < 3.6.23-45.el6_9 | samba-domainjoin-gui-3.6.23-45.el6_9.i686.rpm |
CentOS | 6 | i686 | samba-swat | < 3.6.23-45.el6_9 | samba-swat-3.6.23-45.el6_9.i686.rpm |
CentOS | 6 | i686 | samba-winbind | < 3.6.23-45.el6_9 | samba-winbind-3.6.23-45.el6_9.i686.rpm |
CentOS | 6 | i686 | samba-winbind-clients | < 3.6.23-45.el6_9 | samba-winbind-clients-3.6.23-45.el6_9.i686.rpm |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
6 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
0.651 Medium
EPSS
Percentile
97.8%