Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in Samba (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in Samba (Aktualisierung)
ID: USN-4167-2
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 ESM, Ubuntu 14.04 ESM
Datum: Di, 29. Oktober 2019, 17:39
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14847
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218
Applikationen: Samba
Update von: Mehrere Probleme in Samba

Originalnachricht


--===============1456682027437975071==
Content-Type: multipart/signed; micalg=pgp-sha1;
protocol="application/pgp-signature";
boundary="HcAYCG3uE/tztfnV"
Content-Disposition: inline


--HcAYCG3uE/tztfnV
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-4167-2
October 29, 2019

samba vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 14.04 ESM
- Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in Samba.

Software Description:
- samba: SMB/CIFS file, print, and login server for Unix

Details:

USN-4167-1 fixed several vulnerabilities in Samba. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

Michael Hanselmann discovered that the Samba client code incorrectly
handled path separators. If a user were tricked into connecting to a
malicious server, a remote attacker could use this issue to cause the
client to access local pathnames instead of network pathnames.
(CVE-2019-10218)

Adam Xu discovered that Samba incorrectly handled the dirsync LDAP control.
A remote attacker with "get changes" permissions could possibly use
this
issue to cause Samba to crash, resulting in a denial of service. This issue
only affected Ubuntu 14.04 ESM. (CVE-2019-14847)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
libsmbclient 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm3
samba 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm3

Ubuntu 12.04 ESM:
libsmbclient 2:3.6.25-0ubuntu0.12.04.19
samba 2:3.6.25-0ubuntu0.12.04.19

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4167-2
https://usn.ubuntu.com/4167-1
CVE-2019-10218, CVE-2019-14847

--HcAYCG3uE/tztfnV
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=OtoF
-----END PGP SIGNATURE-----

--HcAYCG3uE/tztfnV--


--===============1456682027437975071==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung