Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.845156
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-5142-2)
Summary:The remote host is missing an update for the 'samba' package(s) announced via the USN-5142-2 advisory.
Description:Summary:
The remote host is missing an update for the 'samba' package(s) announced via the USN-5142-2 advisory.

Vulnerability Insight:
USN-5142-1 fixed vulnerabilities in Samba. Some of the upstream changes
introduced regressions in name mapping and backups.

Please see the following upstream bugs for more information:
[links moved to references]

This update fixes the problem.

Original advisory details:

Stefan Metzmacher discovered that Samba incorrectly handled SMB1 client
connections. A remote attacker could possibly use this issue to downgrade
connections to plaintext authentication. (CVE-2016-2124)

Andrew Bartlett discovered that Samba incorrectly mapping domain users to
local users. An authenticated attacker could possibly use this issue to
become root on domain members. (CVE-2020-25717)

Andrew Bartlett discovered that Samba did not correctly sandbox Kerberos
tickets issues by an RODC. An RODC could print administrator tickets,
contrary to expectations. (CVE-2020-25718)

Andrew Bartlett discovered that Samba incorrectly handled Kerberos tickets.
Delegated administrators could possibly use this issue to impersonate
accounts, leading to total domain compromise. (CVE-2020-25719)

Andrew Bartlett discovered that Samba did not provide stable AD
identifiers to Kerberos acceptors. (CVE-2020-25721)

Andrew Bartlett discovered that Samba did not properly check sensitive
attributes. An authenticated attacker could possibly use this issue to
escalate privileges. (CVE-2020-25722)

Stefan Metzmacher discovered that Samba incorrectly handled certain large
DCE/RPC requests. A remote attacker could possibly use this issue to
bypass signature requirements. (CVE-2021-23192)

William Ross discovered that Samba incorrectly handled memory. A remote
attacker could use this issue to cause Samba to crash, resulting in a
denial of service, or possibly escalate privileges. (CVE-2021-3738)

Joseph Sutton discovered that Samba incorrectly handled certain TGS
requests. An authenticated attacker could possibly use this issue to cause
Samba to crash, resulting in a denial of service. (CVE-2021-3671)

The fix for CVE-2020-25717 results in possible behaviour changes that could
affect certain environments. Please see the upstream advisory for more
information:

[link moved to references]

Affected Software/OS:
'samba' package(s) on Ubuntu 20.04, Ubuntu 21.04, Ubuntu 21.10.

Solution:
Please install the updated package(s).

CVSS Score:
9.0

CVSS Vector:
AV:N/AC:L/Au:S/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2016-2124
https://security.gentoo.org/glsa/202309-06
https://bugzilla.redhat.com/show_bug.cgi?id=2019660
https://www.samba.org/samba/security/CVE-2016-2124.html
https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-25717
https://bugzilla.redhat.com/show_bug.cgi?id=2019672
https://www.samba.org/samba/security/CVE-2020-25717.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-25718
https://bugzilla.redhat.com/show_bug.cgi?id=2019726
https://www.samba.org/samba/security/CVE-2020-25718.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-25719
https://bugzilla.redhat.com/show_bug.cgi?id=2019732
https://www.samba.org/samba/security/CVE-2020-25719.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-25721
https://bugzilla.redhat.com/show_bug.cgi?id=2021728
https://bugzilla.samba.org/show_bug.cgi?id=14725
https://www.samba.org/samba/security/CVE-2020-25721.html
Common Vulnerability Exposure (CVE) ID: CVE-2020-25722
https://bugzilla.redhat.com/show_bug.cgi?id=2019764
https://www.samba.org/samba/security/CVE-2020-25722.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-23192
https://bugzilla.redhat.com/show_bug.cgi?id=2019666
https://ubuntu.com/security/CVE-2021-23192
https://www.samba.org/samba/security/CVE-2021-23192.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-3671
Debian Security Information: DSA-5287 (Google Search)
https://www.debian.org/security/2022/dsa-5287
https://bugzilla.redhat.com/show_bug.cgi?id=2013080,
https://bugzilla.samba.org/show_bug.cgi?id=14770,
https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a
https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-3738
https://bugzilla.redhat.com/show_bug.cgi?id=2021726
https://bugzilla.samba.org/show_bug.cgi?id=14468
https://www.samba.org/samba/security/CVE-2021-3738.html
CopyrightCopyright (C) 2021 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.