USN-3426-2: Samba vulnerabilities
2 November 2017
Several security issues were fixed in XXX-APP-XXX.
Releases
Packages
- samba - SMB/CIFS file, print, and login server for Unix
Details
USN-3426-1 fixed several vulnerabilities in Samba. This update
provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Stefan Metzmacher discovered that Samba incorrectly enforced SMB signing in
certain situations. A remote attacker could use this issue to perform a
machine-in-the-middle attack. (CVE-2017-12150)
Yihan Lian and Zhibin Hu discovered that Samba incorrectly handled memory
when SMB1 is being used. A remote attacker could possibly use this issue to
obtain server memory contents. (CVE-2017-12163)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3426-1: winbind, smbclient, samba-dev, libsmbsharemodes0, registry-tools, samba-dsdb-modules, samba-common-bin, libnss-winbind, libpam-smbpass, python-samba, libparse-pidl-perl, samba-testsuite, samba, samba-libs, samba-common, libwbclient-dev, libsmbsharemodes-dev, libsmbclient, ctdb, samba-doc, libsmbclient-dev, samba-vfs-modules, libpam-winbind, libwbclient0