7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.651 Medium
EPSS
Percentile
97.9%
CentOS Errata and Security Advisory CESA-2017:2791
Samba is an open-source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information.
Security Fix(es):
It was found that samba did not enforce “SMB signing” when certain configuration options were enabled. A remote attacker could launch a man-in-the-middle attack and retrieve information in plain-text. (CVE-2017-12150)
An information leak flaw was found in the way SMB1 protocol was implemented by Samba. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker. (CVE-2017-12163)
Red Hat would like to thank the Samba project for reporting CVE-2017-12150 and Yihan Lian and Zhibin Hu (Qihoo 360 GearTeam), Stefan Metzmacher (SerNet), and Jeremy Allison (Google) for reporting CVE-2017-12163. Upstream acknowledges Stefan Metzmacher (SerNet) as the original reporter of CVE-2017-12150.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2017-September/084706.html
Affected packages:
samba4
samba4-client
samba4-common
samba4-dc
samba4-dc-libs
samba4-devel
samba4-libs
samba4-pidl
samba4-python
samba4-test
samba4-winbind
samba4-winbind-clients
samba4-winbind-krb5-locator
Upstream details at:
https://access.redhat.com/errata/RHSA-2017:2791
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | samba4 | < 4.2.10-11.el6_9 | samba4-4.2.10-11.el6_9.i686.rpm |
CentOS | 6 | i686 | samba4-client | < 4.2.10-11.el6_9 | samba4-client-4.2.10-11.el6_9.i686.rpm |
CentOS | 6 | i686 | samba4-common | < 4.2.10-11.el6_9 | samba4-common-4.2.10-11.el6_9.i686.rpm |
CentOS | 6 | i686 | samba4-dc | < 4.2.10-11.el6_9 | samba4-dc-4.2.10-11.el6_9.i686.rpm |
CentOS | 6 | i686 | samba4-dc-libs | < 4.2.10-11.el6_9 | samba4-dc-libs-4.2.10-11.el6_9.i686.rpm |
CentOS | 6 | i686 | samba4-devel | < 4.2.10-11.el6_9 | samba4-devel-4.2.10-11.el6_9.i686.rpm |
CentOS | 6 | i686 | samba4-libs | < 4.2.10-11.el6_9 | samba4-libs-4.2.10-11.el6_9.i686.rpm |
CentOS | 6 | i686 | samba4-pidl | < 4.2.10-11.el6_9 | samba4-pidl-4.2.10-11.el6_9.i686.rpm |
CentOS | 6 | i686 | samba4-python | < 4.2.10-11.el6_9 | samba4-python-4.2.10-11.el6_9.i686.rpm |
CentOS | 6 | i686 | samba4-test | < 4.2.10-11.el6_9 | samba4-test-4.2.10-11.el6_9.i686.rpm |
7.4 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
5.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:P/A:N
0.651 Medium
EPSS
Percentile
97.9%