Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.13.2023.216.02
Category:Slackware Local Security Checks
Title:Slackware: Security Advisory (SSA:2023-216-02)
Summary:The remote host is missing an update for the 'samba' package(s) announced via the SSA:2023-216-02 advisory.
Description:Summary:
The remote host is missing an update for the 'samba' package(s) announced via the SSA:2023-216-02 advisory.

Vulnerability Insight:
New samba packages are available for Slackware 15.0 and -current to
fix security issues.


Here are the details from the Slackware 15.0 ChangeLog:
+--------------------------+
patches/packages/samba-4.18.5-i586-1_slack15.0.txz: Upgraded.
PLEASE NOTE: We are taking the unusual step of moving to the latest Samba
branch because Windows has made changes that break Samba 4.15.x. The last
4.15.x will be retained in /pasture as a fallback. There may be some
required configuration changes with this, but we've kept using MIT Kerberos
to try to have the behavior change as little as possible. Upgrade carefully.
This update fixes security issues:
When winbind is used for NTLM authentication, a maliciously crafted request
can trigger an out-of-bounds read in winbind and possibly crash it.
SMB2 packet signing is not enforced if an admin configured
'server signing = required' or for SMB2 connections to Domain Controllers
where SMB2 packet signing is mandatory.
An infinite loop bug in Samba's mdssvc RPC service for Spotlight can be
triggered by an unauthenticated attacker by issuing a malformed RPC request.
Missing type validation in Samba's mdssvc RPC service for Spotlight can be
used by an unauthenticated attacker to trigger a process crash in a shared
RPC mdssvc worker process.
As part of the Spotlight protocol Samba discloses the server-side absolute
path of shares and files and directories in search results.
For more information, see:
[links moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'samba' package(s) on Slackware 15.0, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
7.8

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2022-2127
RHBZ#2222791
https://bugzilla.redhat.com/show_bug.cgi?id=2222791
RHSA-2023:6667
https://access.redhat.com/errata/RHSA-2023:6667
RHSA-2023:7139
https://access.redhat.com/errata/RHSA-2023:7139
RHSA-2024:0423
https://access.redhat.com/errata/RHSA-2024:0423
RHSA-2024:0580
https://access.redhat.com/errata/RHSA-2024:0580
https://access.redhat.com/security/cve/CVE-2022-2127
https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/
https://security.netapp.com/advisory/ntap-20230731-0010/
https://www.debian.org/security/2023/dsa-5477
https://www.samba.org/samba/security/CVE-2022-2127.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-3347
RHBZ#2222792
https://bugzilla.redhat.com/show_bug.cgi?id=2222792
RHSA-2023:4325
https://access.redhat.com/errata/RHSA-2023:4325
RHSA-2023:4328
https://access.redhat.com/errata/RHSA-2023:4328
https://access.redhat.com/security/cve/CVE-2023-3347
https://www.samba.org/samba/security/CVE-2023-3347.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-34966
RHBZ#2222793
https://bugzilla.redhat.com/show_bug.cgi?id=2222793
https://access.redhat.com/security/cve/CVE-2023-34966
https://www.samba.org/samba/security/CVE-2023-34966
Common Vulnerability Exposure (CVE) ID: CVE-2023-34967
RHBZ#2222794
https://bugzilla.redhat.com/show_bug.cgi?id=2222794
https://access.redhat.com/security/cve/CVE-2023-34967
https://www.samba.org/samba/security/CVE-2023-34967.html
Common Vulnerability Exposure (CVE) ID: CVE-2023-34968
RHBZ#2222795
https://bugzilla.redhat.com/show_bug.cgi?id=2222795
https://access.redhat.com/security/cve/CVE-2023-34968
https://www.samba.org/samba/security/CVE-2023-34968.html
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.