Lucene search

K
mageiaGentoo FoundationMGASA-2014-0138
HistoryMar 23, 2014 - 1:10 p.m.

Updated samba packages fix security vulnerability

2014-03-2313:10:03
Gentoo Foundation
advisories.mageia.org
12

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

77.1%

In Samba before 3.6.23, the SAMR server neglects to ensure that attempted password changes will update the bad password count, and does not set the lockout flags. This would allow a user unlimited attempts against the password by simply calling ChangePasswordUser2 repeatedly. This is available without any other authentication (CVE-2013-4496)

OSVersionArchitecturePackageVersionFilename
Mageia3noarchsamba< 3.6.15-1.4samba-3.6.15-1.4.mga3
Mageia4noarchsamba< 3.6.23-1samba-3.6.23-1.mga4

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

77.1%