USN-3426-2: Samba vulnerabilities
2 November 2017
Several security issues were fixed in XXX-APP-XXX.
Releases
Packages
- samba - SMB/CIFS file, print, and login server for Unix
Details
USN-3426-1 fixed several vulnerabilities in Samba. This update
provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Stefan Metzmacher discovered that Samba incorrectly enforced SMB signing in
certain situations. A remote attacker could use this issue to perform a
machine-in-the-middle attack. (CVE-2017-12150)
Yihan Lian and Zhibin Hu discovered that Samba incorrectly handled memory
when SMB1 is being used. A remote attacker could possibly use this issue to
obtain server memory contents. (CVE-2017-12163)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3426-1: samba-common, libparse-pidl-perl, libsmbsharemodes-dev, libpam-smbpass, ctdb, libnss-winbind, samba-testsuite, libsmbsharemodes0, samba, registry-tools, libsmbclient, python-samba, winbind, samba-dev, libwbclient-dev, libsmbclient-dev, libpam-winbind, samba-dsdb-modules, libwbclient0, smbclient, samba-vfs-modules, samba-doc, samba-common-bin, samba-libs