Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Samba
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Samba
ID: USN-2855-1
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.04, Ubuntu 15.10
Datum: Di, 5. Januar 2016, 22:47
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8467
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330
Applikationen: Samba

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8768037204316649449==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="lPIQ4ceSvSTsirudKUaS2AMLnAdrSqh5U"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--lPIQ4ceSvSTsirudKUaS2AMLnAdrSqh5U
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2855-1
January 05, 2016

samba vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in Samba.

Software Description:
- samba: SMB/CIFS file, print, and login server for Unix

Details:

Thilo Uttendorfer discovered that the Samba LDAP server incorrectly handled
certain packets. A remote attacker could use this issue to cause the LDAP
server to stop responding, resulting in a denial of service. This issue
only affected Ubuntu 14.04 LTS, Ubuntu 15.04 and Ubuntu 15.10.
(CVE-2015-3223)

Jan Kasprzak discovered that Samba incorrectly handled certain symlinks. A
remote attacker could use this issue to access files outside the exported
share path. (CVE-2015-5252)

Stefan Metzmacher discovered that Samba did not enforce signing when
creating encrypted connections. If a remote attacker were able to perform a
man-in-the-middle attack, this flaw could be exploited to view sensitive
information. (CVE-2015-5296)

It was discovered that Samba incorrectly performed access control when
using the VFS shadow_copy2 module. A remote attacker could use this issue
to access snapshots, contrary to intended permissions. (CVE-2015-5299)

Douglas Bagnall discovered that Samba incorrectly handled certain string
lengths. A remote attacker could use this issue to possibly access
sensitive information. (CVE-2015-5330)

It was discovered that the Samba LDAP server incorrectly handled certain
packets. A remote attacker could use this issue to cause the LDAP server to
stop responding, resulting in a denial of service. This issue only affected
Ubuntu 14.04 LTS, Ubuntu 15.04 and Ubuntu 15.10. (CVE-2015-7540)

Andrew Bartlett discovered that Samba incorrectly checked administrative
privileges during creation of machine accounts. A remote attacker could
possibly use this issue to bypass intended access restrictions in certain
environments. This issue only affected Ubuntu 14.04 LTS, Ubuntu 15.04 and
Ubuntu 15.10. (CVE-2015-8467)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
samba 2:4.1.17+dfsg-4ubuntu3.1

Ubuntu 15.04:
samba 2:4.1.13+dfsg-4ubuntu3.1

Ubuntu 14.04 LTS:
samba 2:4.1.6+dfsg-1ubuntu2.14.04.11

Ubuntu 12.04 LTS:
samba 2:3.6.3-2ubuntu2.13

In general, a standard system update will make all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2855-1
CVE-2015-3223, CVE-2015-5252, CVE-2015-5296, CVE-2015-5299,
CVE-2015-5330, CVE-2015-7540, CVE-2015-8467

Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.1.17+dfsg-4ubuntu3.1
https://launchpad.net/ubuntu/+source/samba/2:4.1.13+dfsg-4ubuntu3.1
https://launchpad.net/ubuntu/+source/samba/2:4.1.6+dfsg-1ubuntu2.14.04.11
https://launchpad.net/ubuntu/+source/samba/2:3.6.3-2ubuntu2.13



--lPIQ4ceSvSTsirudKUaS2AMLnAdrSqh5U
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQIcBAEBCgAGBQJWjBkPAAoJEGVp2FWnRL6T4MQQAIywk2UUuoUeroqF4u3gFfQN
5EtJk09nnUpYljy9fEQ/nlrkDMKZYa88pKDt7vLAroiIusY/i1mRLOY/znncDRYo
q35prZcoQfpJSKUUKMSBh5pcPZKHUOK6MNOm0hNFAs7+bn9dHda8CVeSwmC/Sx1u
rtEEbYe8gqNf29AFlDRGOPFQH/UCTTR1jz6etz/FGOLs8k7WRp2cd6EKrbfA7Szj
ELkttpFBGEgbHnY7BXOpncsryZDSm6l84ncteQZgc7PhW3QoIu9kpH5fClUIpP87
WXs6SOjgXTwiWe4aOTCm1pvPuhiroAzsMss29DpN85IyHUhiWOIc27HvpI/SQYoh
1dWAHTNQ/WsUts3IHOBk2rO2XTPlKsPMccVixeUmDX29xLsjUWx/7n85srsZFQFx
/Los9A5It06ty2eriRIzLg1F8hcfgZoykm/pPQSj9cpZ9Pg6DJCMivZsN9JWMLfg
LjNrZeB8fDNK/ByMUIRVm3TMMrdsQ5N0+H0XmvTaTtozwVagxc11eOhwNijz62/D
N9MnmtuCMqWahA4kpX/yfn+l7jm3R9G5mhDCseTczmB/ejWdzASuCaGvwvNN/dXU
RFgyI9a2Kuz3g6b0f7aChutmwpFmiI5EZH4RcuGQLU/nTOkVHGULjxoIjh4sUej9
cJiC7gYA2jTsE0Ua8BYo
=unJc
-----END PGP SIGNATURE-----

--lPIQ4ceSvSTsirudKUaS2AMLnAdrSqh5U--


--===============8768037204316649449==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============8768037204316649449==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung