Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Samba
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Samba
ID: SUSE-SU-2016:1028-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Server 11-SP2-LTSS, SUSE Linux Enterprise Debuginfo 11-SP2
Datum: Mi, 13. April 2016, 23:13
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111

Originalnachricht

   SUSE Security Update: Security update for samba
______________________________________________________________________________

Announcement ID: SUSE-SU-2016:1028-1
Rating: important
References: #936862 #967017 #971965 #973031 #973032 #973033
#973034 #973036
Cross-References: CVE-2015-5370 CVE-2016-2110 CVE-2016-2111
CVE-2016-2112 CVE-2016-2113 CVE-2016-2115
CVE-2016-2118
Affected Products:
SUSE Linux Enterprise Server 11-SP2-LTSS
SUSE Linux Enterprise Debuginfo 11-SP2
______________________________________________________________________________

An update that solves 7 vulnerabilities and has one errata
is now available.

Description:

samba was updated to fix seven security issues.

These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM
attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP
authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have
been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM
attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks
(bsc#973036).
- CVE-2016-2118: "Badlock" DCERPC impersonation of authenticated
account
were possible (bsc#971965).

These non-security issues were fixed:
- bsc#967017: Fix leaking memory in libsmbclient in cli_set_mntpoint
function
- Getting and setting Windows ACLs on symlinks can change permissions on
link


Patch Instructions:

To install this SUSE Security Update use YaST online_update.
Alternatively you can run the command listed for your product:

- SUSE Linux Enterprise Server 11-SP2-LTSS:

zypper in -t patch slessp2-samba-12508=1

- SUSE Linux Enterprise Debuginfo 11-SP2:

zypper in -t patch dbgsp2-samba-12508=1

To bring your system up-to-date, use "zypper patch".


Package List:

- SUSE Linux Enterprise Server 11-SP2-LTSS (i586 s390x x86_64):

ldapsmb-1.34b-52.1
libldb1-3.6.3-52.1
libsmbclient0-3.6.3-52.1
libtalloc2-3.6.3-52.1
libtdb1-3.6.3-52.1
libtevent0-3.6.3-52.1
libwbclient0-3.6.3-52.1
samba-3.6.3-52.1
samba-client-3.6.3-52.1
samba-krb-printing-3.6.3-52.1
samba-winbind-3.6.3-52.1

- SUSE Linux Enterprise Server 11-SP2-LTSS (s390x x86_64):

libsmbclient0-32bit-3.6.3-52.1
libtalloc2-32bit-3.6.3-52.1
libtdb1-32bit-3.6.3-52.1
libtevent0-32bit-3.6.3-52.1
libwbclient0-32bit-3.6.3-52.1
samba-32bit-3.6.3-52.1
samba-client-32bit-3.6.3-52.1
samba-winbind-32bit-3.6.3-52.1

- SUSE Linux Enterprise Server 11-SP2-LTSS (noarch):

samba-doc-3.6.3-52.1

- SUSE Linux Enterprise Debuginfo 11-SP2 (i586 s390x x86_64):

samba-debuginfo-3.6.3-52.1
samba-debugsource-3.6.3-52.1

- SUSE Linux Enterprise Debuginfo 11-SP2 (s390x x86_64):

samba-debuginfo-32bit-3.6.3-52.1


References:

https://www.suse.com/security/cve/CVE-2015-5370.html
https://www.suse.com/security/cve/CVE-2016-2110.html
https://www.suse.com/security/cve/CVE-2016-2111.html
https://www.suse.com/security/cve/CVE-2016-2112.html
https://www.suse.com/security/cve/CVE-2016-2113.html
https://www.suse.com/security/cve/CVE-2016-2115.html
https://www.suse.com/security/cve/CVE-2016-2118.html
https://bugzilla.suse.com/936862
https://bugzilla.suse.com/967017
https://bugzilla.suse.com/971965
https://bugzilla.suse.com/973031
https://bugzilla.suse.com/973032
https://bugzilla.suse.com/973033
https://bugzilla.suse.com/973034
https://bugzilla.suse.com/973036

--
To unsubscribe, e-mail: opensuse-security-announce+unsubscribe@opensuse.org
For additional commands, e-mail: opensuse-security-announce+help@opensuse.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung