Lucene search

K
debianDebianDEBIAN:DSA-3909-1:5F09A
HistoryJul 14, 2017 - 12:27 p.m.

[SECURITY] [DSA 3909-1] samba security update

2017-07-1412:27:10
lists.debian.org
16

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.047 Low

EPSS

Percentile

92.6%


Debian Security Advisory DSA-3909-1 [email protected]
https://www.debian.org/security/ Yves-Alexis Perez
July 14, 2017 https://www.debian.org/security/faq


Package : samba
CVE ID : CVE-2017-11103
Debian Bug : 868209

Jeffrey Altman, Viktor Duchovni and Nico Williams identified a mutual
authentication bypass vulnerability in samba, the SMB/CIFS file, print, and
login server. Also known as Orpheus' Lyre, this vulnerability is located in
Samba Kerberos Key Distribution Center (KDC-REP) component and could be used by
an attacker on the network path to impersonate a server.

More details can be found on the vulnerability website
(https://orpheus-lyre.info/) and on the Samba project website
(https://www.samba.org/samba/security/CVE-2017-11103.html)

For the oldstable distribution (jessie), this problem has been fixed
in version 2:4.2.14+dfsg-0+deb8u7.

For the stable distribution (stretch), this problem has been fixed in
version 2:4.5.8+dfsg-2+deb9u1.

For the testing distribution (buster), this problem has been fixed
in version 2:4.6.5+dfsg-4.

For the unstable distribution (sid), this problem has been fixed in
version 2:4.6.5+dfsg-4.

We recommend that you upgrade your samba packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

OSVersionArchitecturePackageVersionFilename
Debian8allsamba< 2:4.2.14+dfsg-0+deb8u7samba_2:4.2.14+dfsg-0+deb8u7_all.deb
Debian9allsamba< 2:4.5.8+dfsg-2+deb9u1samba_2:4.5.8+dfsg-2+deb9u1_all.deb

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.047 Low

EPSS

Percentile

92.6%