Lucene search

K
osvGoogleOSV:DSA-3740-1
HistoryDec 19, 2016 - 12:00 a.m.

samba - security update

2016-12-1900:00:00
Google
osv.dev
20

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.967 High

EPSS

Percentile

99.4%

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
print, and login server for Unix. The Common Vulnerabilities and
Exposures project identifies the following issues:

  • CVE-2016-2119
    Stefan Metzmacher discovered that client-side SMB2/3 required
    signing can be downgraded, allowing a man-in-the-middle attacker to
    impersonate a server being connected to by Samba, and return
    malicious results.
  • CVE-2016-2123
    Trend Micro’s Zero Day Initiative and Frederic Besler discovered
    that the routine ndr_pull_dnsp_name, used to parse data from the
    Samba Active Directory ldb database, contains an integer overflow
    flaw, leading to an attacker-controlled memory overwrite. An
    authenticated user can take advantage of this flaw for remote
    privilege escalation.
  • CVE-2016-2125
    Simo Sorce of Red Hat discovered that the Samba client code always
    requests a forwardable ticket when using Kerberos authentication. A
    target server, which must be in the current or trusted domain/realm,
    is given a valid general purpose Kerberos Ticket Granting Ticket
    (TGT), which can be used to fully impersonate the authenticated user
    or service.
  • CVE-2016-2126
    Volker Lendecke discovered several flaws in the Kerberos PAC
    validation. A remote, authenticated, attacker can cause the winbindd
    process to crash using a legitimate Kerberos ticket due to incorrect
    handling of the PAC checksum. A local service with access to the
    winbindd privileged pipe can cause winbindd to cache elevated access
    permissions.

For the stable distribution (jessie), these problems have been fixed in
version 2:4.2.14+dfsg-0+deb8u2. In addition, this update contains
several changes originally targeted for the upcoming jessie point
release.

We recommend that you upgrade your samba packages.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.967 High

EPSS

Percentile

99.4%