drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Zwei Probleme in Samba (Aktualisierung)
Name: |
Zwei Probleme in Samba (Aktualisierung) |
|
ID: |
USN-3426-2 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 12.04 ESM |
|
Datum: |
Do, 2. November 2017, 17:21 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150 |
|
Applikationen: |
Samba |
|
Update von: |
Mehrere Probleme in Samba |
|
Originalnachricht |
--===============8334177908631460448== Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="=-fIZfAOQt6Qaay+Nt/J4b"
--=-fIZfAOQt6Qaay+Nt/J4b Content-Type: text/plain; charset="UTF-8 Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-3426-2 November 02, 2017
samba vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in XXX-APP-XXX.
Software Description: - samba: SMB/CIFS file, print, and login server for Unix
Details:
USN-3426-1 fixed several vulnerabilities in Samba. This update provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
 Stefan Metzmacher discovered that Samba incorrectly enforced SMB  signing in certain situations. A remote attacker could use this issue  to perform a man in the middle attack. (CVE-2017-12150)
 Yihan Lian and Zhibin Hu discovered that Samba incorrectly handled  memory when SMB1 is being used. A remote attacker could possibly use  this issue to obtain server memory contents. (CVE-2017-12163)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 ESM:  samba                           2:3.6.25-0ubuntu0.12.04.13
In general, a standard system update will make all the necessary changes.
References: Â https://www.ubuntu.com/usn/usn-3426-2 Â https://www.ubuntu.com/usn/usn-3426-1 Â CVE-2017-12150, CVE-2017-12163
--ßIZfAOQt6Qaay+Nt/J4b Content-Type: application/pgp-signature; name="signature.asc" Content-Description: This is a digitally signed message part Content-Transfer-Encoding: 7bit
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQIcBAABCAAGBQJZ+ymoAAoJEEW851uECx9pXv4P/ivg/FN6+9raYJVOop9Kh6wj atyLeIKZxEZDz79QrLF8fSiw3414W5+hl22k3wt7cosle0DjfbeDneg5W5yg7R1v b2Eu/pRb5IgxwARt3kDvOgXOC8F/QwjxH9A8DpZ5m+F765YAbeyFeb0gu5ZrS3/S NMhXe4Pcdmk6ifmRGibBMrJw+rsn1uTQffKji5oS1zs3vKVDA47ygOe0OGL0lT8d AKM8zi0ES7CG2R5qApDXCjhmRhhZcAYNSKYpDRtRu85K2dMLXlP4m9Tvu12+L+1s cDFjnWbn7X4W+yz8cENdY3wUMQrRS+iP/3D04+AjuYScLNuJNv3U+nacGavyWXRo DJKo2EUiEBl3iA5QQ2PakD/1VREyX3bDCsnukzllN4i63Y10OH+crboK6aNe2L6h Zg4RkKFUGiDGsBohvz8NRbDPT7O6iyOYkeo2CxTKN2iQpxO4Ja22FVsnJUtMHgKR gf8/NL7LXolUpJ3NVcWztIoKlbxzL4l4La15RCvEMpsKvZ9Xn8RF2GXVTvu6LaeR TjO0ORR01FQEjM0K9bFhZ9iReZbj1q9PVEi54Ps3zKWwAUf+ttJDJQFTdeQSp13E LXexTGEH4Sf+yx9JRn8iCFqxea6/dCnsos7ml1C01qVHdOGX8dlkiLoXwe8m1bex OI53aJti5eEzJOjZaPKN =prpE -----END PGP SIGNATURE-----
--=-fIZfAOQt6Qaay+Nt/J4b--
--===============8334177908631460448== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============8334177908631460448==--
|
|
|
|