You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa samba

Sigurnosni nedostaci programskog paketa samba

==========================================================================
Ubuntu Security Notice USN-4167-1
October 29, 2019

samba vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.10
– Ubuntu 19.04
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in Samba.

Software Description:
– samba: SMB/CIFS file, print, and login server for Unix

Details:

Michael Hanselmann discovered that the Samba client code incorrectly
handled path separators. If a user were tricked into connecting to a
malicious server, a remote attacker could use this issue to cause the
client to access local pathnames instead of network pathnames.
(CVE-2019-10218)

Simon Fonteneau and Björn Baumbach discovered that Samba incorrectly
handled the check password script. This issue could possibly bypass custom
password complexity checks, contrary to expectations. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 19.04, and Ubuntu 19.10. (CVE-2019-14833)

Adam Xu discovered that Samba incorrectly handled the dirsync LDAP control.
A remote attacker with “get changes” permissions could possibly use this
issue to cause Samba to crash, resulting in a denial of service.
(CVE-2019-14847)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
libsmbclient 2:4.10.7+dfsg-0ubuntu2.2
samba 2:4.10.7+dfsg-0ubuntu2.2

Ubuntu 19.04:
libsmbclient 2:4.10.0+dfsg-0ubuntu2.6
samba 2:4.10.0+dfsg-0ubuntu2.6

Ubuntu 18.04 LTS:
libsmbclient 2:4.7.6+dfsg~ubuntu-0ubuntu2.13
samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.13

Ubuntu 16.04 LTS:
libsmbclient 2:4.3.11+dfsg-0ubuntu0.16.04.23
samba 2:4.3.11+dfsg-0ubuntu0.16.04.23

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4167-1
CVE-2019-10218, CVE-2019-14833, CVE-2019-14847

Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.10.7+dfsg-0ubuntu2.2
https://launchpad.net/ubuntu/+source/samba/2:4.10.0+dfsg-0ubuntu2.6
https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2.13
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.23

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAl24O84ACgkQZWnYVadE
vpNb6w/7BOPuHa2xQuzMn26TNW/wAivI8xMfj8gIToZThfDGuR+XlaxJI/k8VUK7
CDaB6g2DhFZ2RvsnkO2WQozGo/HYd4RbZB3zv8S+AcQzyKnWhjx4PZM7egMbJGJJ
ZiwEjqEbBs3XernHHS6fdCGQTv8xVmN+oG2BIrTPqSjY6kxb4yHXL9c+FB49H+rv
MxEscJpyEhW4/1I2FvmEIcUq3QkG8ywJxC9nIFzdb/bJx/ADA0jt5fNlmERj0wBa
5T5Za94JypTC9UibxP9IYRYjlOtqbYEmmo1WDLuP5tF0Qo7EqGo0feR7VxVSEL6C
S9EX0nGvnrAXouk3hBIuV88SUf3EddQL9chuLK1B2JkTZMNiwTIexCBI+Q+wI4sq
l8y3qFwYjiS+yoGVtJwfsyjB7GmWY5YAyHWEWOb/6m16EzCqSEpr36NIuOwCzN2P
6YJ5cRucIdXNhmXUwpkYLFzT5AjYms7USp2vAls3+E9DZuUp1dXcyTuU4FHh5qbZ
sYCBFcQpgEI85PzwOjZHw8FEqGZGJM6Ap3KrtODkf0slyq+42yYI2nTQ5nHWZPeb
YgMCnhLTyW95bDqmuUMOl5jvPVueA4tpDzX2B9Rv9J86BwG4aJYT0HePJ8ubDLAd
n/I2GR9Tap249pxdhIPp7EATs6l5QXqxSfNP86q1N51TaWGY8cE=
=AgTT
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4167-2
October 29, 2019

samba vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in Samba.

Software Description:
– samba: SMB/CIFS file, print, and login server for Unix

Details:

USN-4167-1 fixed several vulnerabilities in Samba. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

Michael Hanselmann discovered that the Samba client code incorrectly
handled path separators. If a user were tricked into connecting to a
malicious server, a remote attacker could use this issue to cause the
client to access local pathnames instead of network pathnames.
(CVE-2019-10218)

Adam Xu discovered that Samba incorrectly handled the dirsync LDAP control.
A remote attacker with “get changes” permissions could possibly use this
issue to cause Samba to crash, resulting in a denial of service. This issue
only affected Ubuntu 14.04 ESM. (CVE-2019-14847)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
libsmbclient 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm3
samba 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm3

Ubuntu 12.04 ESM:
libsmbclient 2:3.6.25-0ubuntu0.12.04.19
samba 2:3.6.25-0ubuntu0.12.04.19

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4167-2
https://usn.ubuntu.com/4167-1
CVE-2019-10218, CVE-2019-14847
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=OtoF
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci jezgre operacijskog sustava

Otkriveni su sigurnosni nedostaci jezgre operacijskog sustava RHEL. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju izazivanje DoS stanja, izvršavanje proizvoljnog programskog...

Close