![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.871822 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for samba4 RHSA-2017:1271-01 |
Resumen: | The remote host is missing an update for the 'samba4'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'samba4' package(s) announced via the referenced advisory. Vulnerability Insight: Samba is an open-source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. Security Fix(es): * A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root. (CVE-2017-7494) Red Hat would like to thank the Samba project for reporting this issue. Upstream acknowledges steelo as the original reporter. Affected Software/OS: samba4 on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-7494 1038552 http://www.securitytracker.com/id/1038552 42060 https://www.exploit-db.com/exploits/42060/ 42084 https://www.exploit-db.com/exploits/42084/ 98636 http://www.securityfocus.com/bid/98636 DSA-3860 http://www.debian.org/security/2017/dsa-3860 GLSA-201805-07 https://security.gentoo.org/glsa/201805-07 RHSA-2017:1270 https://access.redhat.com/errata/RHSA-2017:1270 RHSA-2017:1271 https://access.redhat.com/errata/RHSA-2017:1271 RHSA-2017:1272 https://access.redhat.com/errata/RHSA-2017:1272 RHSA-2017:1273 https://access.redhat.com/errata/RHSA-2017:1273 RHSA-2017:1390 https://access.redhat.com/errata/RHSA-2017:1390 https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01 https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_us https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_us https://security.netapp.com/advisory/ntap-20170524-0001/ https://www.samba.org/samba/security/CVE-2017-7494.html |
Copyright | Copyright (C) 2017 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |