Mageia 2020-0380: samba security update | LinuxSecurity.com
MGASA-2020-0380 - Updated samba packages fix security vulnerability

Publication date: 30 Sep 2020
URL: https://advisories.mageia.org/MGASA-2020-0380.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2020-1472

When Samba is used as a domain controller, an unauthenticated attacker on the
network can gain administrator access by exploiting a netlogon protocol flaw
(CVE-2020-1472).

Note that Samba installations are not vulnerable unless they have the smb.conf
lines 'server schannel = no' or 'server schannel = auto'.

References:
- https://bugs.mageia.org/show_bug.cgi?id=27299
- https://www.samba.org/samba/history/samba-4.10.18.html
- https://www.samba.org/samba/security/CVE-2020-1472.html
- https://ubuntu.com/security/notices/USN-4510-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472

SRPMS:
- 7/core/samba-4.10.18-1.mga7

Mageia 2020-0380: samba security update

When Samba is used as a domain controller, an unauthenticated attacker on the network can gain administrator access by exploiting a netlogon protocol flaw (CVE-2020-1472)

Summary

When Samba is used as a domain controller, an unauthenticated attacker on the network can gain administrator access by exploiting a netlogon protocol flaw (CVE-2020-1472).
Note that Samba installations are not vulnerable unless they have the smb.conf lines 'server schannel = no' or 'server schannel = auto'.

References

- https://bugs.mageia.org/show_bug.cgi?id=27299

- https://www.samba.org/samba/history/samba-4.10.18.html

- https://www.samba.org/samba/security/CVE-2020-1472.html

- https://ubuntu.com/security/notices/USN-4510-1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472

Resolution

MGASA-2020-0380 - Updated samba packages fix security vulnerability

SRPMS

- 7/core/samba-4.10.18-1.mga7

Severity
Publication date: 30 Sep 2020
URL: https://advisories.mageia.org/MGASA-2020-0380.html
Type: security
CVE: CVE-2020-1472

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.