Lucene search

K
osvGoogleOSV:DSA-3514-1
HistoryMar 12, 2016 - 12:00 a.m.

samba - security update

2016-03-1200:00:00
Google
osv.dev
11

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:

  • CVE-2015-7560
    Jeremy Allison of Google, Inc. and the Samba Team discovered that
    Samba incorrectly handles getting and setting ACLs on a symlink
    path. An authenticated malicious client can use SMB1 UNIX extensions
    to create a symlink to a file or directory, and then use non-UNIX
    SMB1 calls to overwrite the contents of the ACL on the file or
    directory linked to.
  • CVE-2016-0771
    Garming Sam and Douglas Bagnall of Catalyst IT discovered that Samba
    is vulnerable to an out-of-bounds read issue during DNS TXT record
    handling, if Samba is deployed as an AD DC and chosen to run the
    internal DNS server. A remote attacker can exploit this flaw to
    cause a denial of service (Samba crash), or potentially, to allow
    leakage of memory from the server in the form of a DNS TXT reply.

Additionally this update includes a fix for a regression introduced due
to the upstream fix for CVE-2015-5252 in DSA-3433-1 in setups where the
share path is ‘/’.

For the oldstable distribution (wheezy), these problems have been fixed
in version 2:3.6.6-6+deb7u7. The oldstable distribution (wheezy) is not
affected by CVE-2016-0771.

For the stable distribution (jessie), these problems have been fixed in
version 2:4.1.17+dfsg-2+deb8u2.

For the unstable distribution (sid), these problems have been fixed in
version 2:4.3.6+dfsg-1.

We recommend that you upgrade your samba packages.

7.2 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N