Mangelnde Rechteprüfung in Samba
ID: | DSA-3909-1 |
Distribution: | Debian |
Plattformen: | Debian sid, Debian jessie, Debian stretch, Debian buster |
Datum: | Sa, 15. Juli 2017, 09:24 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 |
Applikationen: | Samba |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian Security Advisory DSA-3909-1 security@debian.org https://www.debian.org/security/ Yves-Alexis Perez July 14, 2017 https://www.debian.org/security/faq - ------------------------------------------------------------------------- Package : samba CVE ID : CVE-2017-11103 Debian Bug : 868209 Jeffrey Altman, Viktor Duchovni and Nico Williams identified a mutual authentication bypass vulnerability in samba, the SMB/CIFS file, print, and login server. Also known as Orpheus' Lyre, this vulnerability is located in Samba Kerberos Key Distribution Center (KDC-REP) component and could be used by an attacker on the network path to impersonate a server. More details can be found on the vulnerability website (https://orpheus-lyre.info/) and on the Samba project website (https://www.samba.org/samba/security/CVE-2017-11103.html) For the oldstable distribution (jessie), this problem has been fixed in version 2:4.2.14+dfsg-0+deb8u7. For the stable distribution (stretch), this problem has been fixed in version 2:4.5.8+dfsg-2+deb9u1. For the testing distribution (buster), this problem has been fixed in version 2:4.6.5+dfsg-4. For the unstable distribution (sid), this problem has been fixed in version 2:4.6.5+dfsg-4. We recommend that you upgrade your samba packages. Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEl0WwInMjgf6efq/1bdtT8qZ1wKUFAllotnEACgkQbdtT8qZ1 wKUelggAmbHEA545HOANov7vXy0CWTjdzg+JXoWwqnAZi7ucyFZ5fdqeiVEL5kl0 +mM2R6DebZhmu6xFJf+PZv6VGKx0KmN1XeJCQxz2x72omKUlyOddnptebeyvpLz3 Pp0nzQqeq70aFF46Cbh3w+9kRAQoaOG2kBmjvPwL+ZkpJlYCy5nPfC35K4lG5QSv pXSqV6S2oD95+j8RReZ0v3DeI4tpbuAvCMtNaSOPmDoBxoVBNuMk7xmLTZuTLlaJ f/cFDQC0Ykx6cmV2SxN49Eo2pnMCz2uT9Iv/7kEzJ1C4mI7vUNgAq/XwMjeAPx7h SOae2x1DVIWPewpJa0pLO7iaOmNiZQ== =2zvn -----END PGP SIGNATURE----- |