Lucene search

K
mageiaGentoo FoundationMGASA-2013-0369
HistoryDec 13, 2013 - 2:22 a.m.

Updated samba package fixes multiple vulnerabilities

2013-12-1302:22:59
Gentoo Foundation
advisories.mageia.org
8

8.3 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.4%

Updated samba packages fix security vulnerabilities: Samba before 3.6.22 incorrectly allows login from authenticated users if the require_membership_of parameter of pam_winbind specifies only invalid group names (CVE-2012-6150). It was discovered that multiple buffer overflows in the processing of DCE-RPC packets may lead to the execution of arbitrary code (CVE-2013-4408).

OSVersionArchitecturePackageVersionFilename
Mageia3noarchsamba< 3.6.15-1.3samba-3.6.15-1.3.mga3

8.3 High

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:C/I:C/A:C

0.007 Low

EPSS

Percentile

80.4%