The remote host is missing an update for the 'samba4' package(s) announced via the referenced advisory. Samba is an open-source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw was found in the way Samba handled ACLs on symbolic links. An authenticated user could use this flaw to gain access to an arbitrary file or directory by overwriting its ACL. Upstream acknowledges Jeremy Allison (Google) and the Samba team as the original reporters
Reporter | Title | Published | Views | Family All 104 |
---|---|---|---|---|
Fedora | [SECURITY] Fedora 22 Update: samba-4.2.9-0.fc22 | 13 Mar 201609:53 | – | fedora |
Fedora | [SECURITY] Fedora 24 Update: samba-4.4.0-0.7.rc4.fc24 | 27 Mar 201601:03 | – | fedora |
Fedora | [SECURITY] Fedora 23 Update: samba-4.3.6-0.fc23 | 12 Mar 201611:51 | – | fedora |
Tenable Nessus | CentOS 6 : samba4 (CESA-2016:0449) | 16 Mar 201600:00 | – | nessus |
Tenable Nessus | RHEL 6 : samba4 (RHSA-2016:0449) | 16 Mar 201600:00 | – | nessus |
Tenable Nessus | Fedora 24 : samba-4.4.0-0.7.rc4.fc24 (2016-4b55f00d00) | 28 Mar 201600:00 | – | nessus |
Tenable Nessus | Oracle Linux 6 : samba4 (ELSA-2016-0449) | 16 Mar 201600:00 | – | nessus |
Tenable Nessus | Amazon Linux AMI : samba (ALAS-2016-674) | 1 Apr 201600:00 | – | nessus |
Tenable Nessus | CentOS 6 / 7 : samba (CESA-2016:0448) | 16 Mar 201600:00 | – | nessus |
Tenable Nessus | Fedora 23 : samba-4.3.6-0.fc23 (2016-ed1587f6ba) | 14 Mar 201600:00 | – | nessus |
Source | Link |
---|---|
redhat | www.redhat.com/archives/rhsa-announce/2016-March/msg00043.html |
# SPDX-FileCopyrightText: 2016 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.871573");
script_version("2024-03-21T05:06:54+0000");
script_tag(name:"last_modification", value:"2024-03-21 05:06:54 +0000 (Thu, 21 Mar 2024)");
script_tag(name:"creation_date", value:"2016-03-16 06:09:11 +0100 (Wed, 16 Mar 2016)");
script_cve_id("CVE-2015-7560");
script_tag(name:"cvss_base", value:"4.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:N/I:P/A:N");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2022-08-29 20:03:00 +0000 (Mon, 29 Aug 2022)");
script_tag(name:"qod_type", value:"package");
script_name("RedHat Update for samba4 RHSA-2016:0449-01");
script_tag(name:"summary", value:"The remote host is missing an update for the 'samba4'
package(s) announced via the referenced advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"insight", value:"Samba is an open-source implementation of
the Server Message Block (SMB) or Common Internet File System (CIFS) protocol,
which allows PC-compatible machines to share files, printers, and other
information.
A flaw was found in the way Samba handled ACLs on symbolic links.
An authenticated user could use this flaw to gain access to an arbitrary
file or directory by overwriting its ACL. (CVE-2015-7560)
Red Hat would like to thank the Samba project for reporting this issue.
Upstream acknowledges Jeremy Allison (Google) and the Samba team as the
original reporters.
All samba4 users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing this
update, the smb service will be restarted automatically.");
script_tag(name:"affected", value:"samba4 on Red Hat Enterprise Linux
Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)");
script_tag(name:"solution", value:"Please Install the Updated Packages.");
script_xref(name:"RHSA", value:"2016:0449-01");
script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2016-March/msg00043.html");
script_tag(name:"solution_type", value:"VendorFix");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2016 Greenbone AG");
script_family("Red Hat Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_6");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release) exit(0);
res = "";
if(release == "RHENT_6")
{
if ((res = isrpmvuln(pkg:"samba4", rpm:"samba4~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-client", rpm:"samba4-client~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-common", rpm:"samba4-common~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-dc", rpm:"samba4-dc~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-dc-libs", rpm:"samba4-dc-libs~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-debuginfo", rpm:"samba4-debuginfo~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-devel", rpm:"samba4-devel~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-libs", rpm:"samba4-libs~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-pidl", rpm:"samba4-pidl~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-python", rpm:"samba4-python~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-swat", rpm:"samba4-swat~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-test", rpm:"samba4-test~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-winbind", rpm:"samba4-winbind~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-winbind-clients", rpm:"samba4-winbind-clients~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba4-winbind-krb5-locator", rpm:"samba4-winbind-krb5-locator~4.0.0~68.el6_7.rc4", rls:"RHENT_6")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo