|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for samba RHSA-2017:1265-01|
|Summary:||The remote host is missing an update for the 'samba'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'samba'
package(s) announced via the referenced advisory.
Samba is an open-source implementation of
the Server Message Block (SMB) protocol and the related Common Internet File
System (CIFS) protocol, which allow PC-compatible machines to share files,
printers, and various information.
* It was found that Samba always requested forwardable tickets when using
Kerberos authentication. A service to which Samba authenticated using
Kerberos could subsequently use the ticket to impersonate Samba to other
services or domain users. (CVE-2016-2125)
* A flaw was found in the way Samba handled PAC (Privilege Attribute
Certificate) checksums. A remote, authenticated attacker could use this
flaw to crash the winbindd process. (CVE-2016-2126)
* A race condition was found in samba server. A malicious samba client
could use this flaw to access files and directories, in areas of the server
file system not exported under the share definitions. (CVE-2017-2619)
Red Hat would like to thank the Samba project for reporting CVE-2017-2619.
Upstream acknowledges Jann Horn (Google) as the original reporter of
Red Hat Enterprise Linux Server (v. 7)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2016-2125|
BugTraq ID: 94988
RedHat Security Advisories: RHSA-2017:0494
RedHat Security Advisories: RHSA-2017:0495
RedHat Security Advisories: RHSA-2017:0662
RedHat Security Advisories: RHSA-2017:0744
RedHat Security Advisories: RHSA-2017:1265
Common Vulnerability Exposure (CVE) ID: CVE-2016-2126
BugTraq ID: 94994
Common Vulnerability Exposure (CVE) ID: CVE-2017-2619
BugTraq ID: 97033
Debian Security Information: DSA-3816 (Google Search)
RedHat Security Advisories: RHSA-2017:2338
RedHat Security Advisories: RHSA-2017:2778
RedHat Security Advisories: RHSA-2017:2789
|Copyright||Copyright (C) 2017 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.