Debian: DSA-3740-1: samba security update

    Date19 Dec 2016
    CategoryDebian
    86
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix. The Common Vulnerabilities and Exposures project identifies the following issues:
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-3740-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                     Salvatore Bonaccorso
    December 19, 2016                     https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : samba
    CVE ID         : CVE-2016-2119 CVE-2016-2123 CVE-2016-2125 CVE-2016-2126
    Debian Bug     : 830195
    
    Several vulnerabilities have been discovered in Samba, a SMB/CIFS file,
    print, and login server for Unix. The Common Vulnerabilities and
    Exposures project identifies the following issues:
    
    CVE-2016-2119
    
        Stefan Metzmacher discovered that client-side SMB2/3 required
        signing can be downgraded, allowing a man-in-the-middle attacker to
        impersonate a server being connected to by Samba, and return
        malicious results.
    
    CVE-2016-2123
    
        Trend Micro's Zero Day Initiative and Frederic Besler discovered
        that the routine ndr_pull_dnsp_name, used to parse data from the
        Samba Active Directory ldb database, contains an integer overflow
        flaw, leading to an attacker-controlled memory overwrite. An
        authenticated user can take advantage of this flaw for remote
        privilege escalation.
    
    CVE-2016-2125
    
        Simo Sorce of Red Hat discovered that the Samba client code always
        requests a forwardable ticket when using Kerberos authentication. A
        target server, which must be in the current or trusted domain/realm,
        is given a valid general purpose Kerberos "Ticket Granting Ticket"
        (TGT), which can be used to fully impersonate the authenticated user
        or service.
    
    CVE-2016-2126
    
        Volker Lendecke discovered several flaws in the Kerberos PAC
        validation. A remote, authenticated, attacker can cause the winbindd
        process to crash using a legitimate Kerberos ticket due to incorrect
        handling of the PAC checksum. A local service with access to the
        winbindd privileged pipe can cause winbindd to cache elevated access
        permissions.
    
    For the stable distribution (jessie), these problems have been fixed in
    version 2:4.2.14+dfsg-0+deb8u2. In addition, this update contains
    several changes originally targeted for the upcoming jessie point
    release.
    
    We recommend that you upgrade your samba packages.
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"67","type":"x","order":"1","pct":57.76,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":12.93,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.31,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.