drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung in Samba
Name: |
Mangelnde Rechteprüfung in Samba |
|
ID: |
DSA-3909-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian sid, Debian jessie, Debian stretch, Debian buster |
|
Datum: |
Sa, 15. Juli 2017, 09:24 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11103 |
|
Applikationen: |
Samba |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-3909-1 security@debian.org https://www.debian.org/security/ Yves-Alexis Perez July 14, 2017 https://www.debian.org/security/faq - -------------------------------------------------------------------------
Package : samba CVE ID : CVE-2017-11103 Debian Bug : 868209
Jeffrey Altman, Viktor Duchovni and Nico Williams identified a mutual authentication bypass vulnerability in samba, the SMB/CIFS file, print, and login server. Also known as Orpheus' Lyre, this vulnerability is located in Samba Kerberos Key Distribution Center (KDC-REP) component and could be used by an attacker on the network path to impersonate a server.
More details can be found on the vulnerability website (https://orpheus-lyre.info/) and on the Samba project website (https://www.samba.org/samba/security/CVE-2017-11103.html)
For the oldstable distribution (jessie), this problem has been fixed in version 2:4.2.14+dfsg-0+deb8u7.
For the stable distribution (stretch), this problem has been fixed in version 2:4.5.8+dfsg-2+deb9u1.
For the testing distribution (buster), this problem has been fixed in version 2:4.6.5+dfsg-4.
For the unstable distribution (sid), this problem has been fixed in version 2:4.6.5+dfsg-4.
We recommend that you upgrade your samba packages.
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEEl0WwInMjgf6efq/1bdtT8qZ1wKUFAllotnEACgkQbdtT8qZ1 wKUelggAmbHEA545HOANov7vXy0CWTjdzg+JXoWwqnAZi7ucyFZ5fdqeiVEL5kl0 +mM2R6DebZhmu6xFJf+PZv6VGKx0KmN1XeJCQxz2x72omKUlyOddnptebeyvpLz3 Pp0nzQqeq70aFF46Cbh3w+9kRAQoaOG2kBmjvPwL+ZkpJlYCy5nPfC35K4lG5QSv pXSqV6S2oD95+j8RReZ0v3DeI4tpbuAvCMtNaSOPmDoBxoVBNuMk7xmLTZuTLlaJ f/cFDQC0Ykx6cmV2SxN49Eo2pnMCz2uT9Iv/7kEzJ1C4mI7vUNgAq/XwMjeAPx7h SOae2x1DVIWPewpJa0pLO7iaOmNiZQ== =2zvn -----END PGP SIGNATURE-----
|
|
|
|