Login
Newsletter
Werbung

Sicherheit: Mangelnde Rechteprüfung in Samba (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mangelnde Rechteprüfung in Samba (Aktualisierung)
ID: USN-3353-2
Distribution: Ubuntu
Plattformen: Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 16.10, Ubuntu 17.04
Datum: Sa, 15. Juli 2017, 19:19
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103
Applikationen: Samba
Update von: Mangelnde Rechteprüfung in Heimdal

Originalnachricht


--===============4955183731805872983==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="DIYaQRZjygY6fA2m"
Content-Disposition: inline


--DIYaQRZjygY6fA2m
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3353-2
July 14, 2017

samba vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 17.04
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Samba could allow unintended access to network services.

Software Description:
- samba: SMB/CIFS file, print, and login server for Unix

Details:

USN-3353-1 fixed a vulnerability in Heimdal. This update provides
the corresponding update for Samba.

Jeffrey Altman, Viktor Dukhovni, and Nicolas Williams discovered
that Samba clients incorrectly trusted unauthenticated portions of
Kerberos tickets. A remote attacker could use this to impersonate
trusted network servers or perform other attacks.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
samba-libs 2:4.5.8+dfsg-0ubuntu0.17.04.4

Ubuntu 16.10:
samba-libs 2:4.4.5+dfsg-2ubuntu5.8

Ubuntu 16.04 LTS:
samba-libs 2:4.3.11+dfsg-0ubuntu0.16.04.9

Ubuntu 14.04 LTS:
samba-libs 2:4.3.11+dfsg-0ubuntu0.14.04.10

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3353-2
https://www.ubuntu.com/usn/usn-3353-1
CVE-2017-11103

Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.5.8+dfsg-0ubuntu0.17.04.4
https://launchpad.net/ubuntu/+source/samba/2:4.4.5+dfsg-2ubuntu5.8
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.9
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.14.04.10


--DIYaQRZjygY6fA2m
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=1AOt
-----END PGP SIGNATURE-----

--DIYaQRZjygY6fA2m--


--===============4955183731805872983==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============4955183731805872983==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung