You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa Samba

Sigurnosni nedostatak programskog paketa Samba

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4454-2
August 10, 2020

samba vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM

Summary:

Samba could be made to crash if it received specially crafted network
traffic.

Software Description:
– samba: SMB/CIFS file, print, and login server for Unix

Details:

USN-4454-1 fixed a vulnerability in Samba. This update provides
the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

Martin von Wittich and Wilko Meyer discovered that Samba incorrectly
handled certain empty UDP packets when being used as a AD DC NBT server. A
remote attacker could possibly use this issue to cause Samba to crash,
resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
samba 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm8

Ubuntu 12.04 ESM:
samba 2:3.6.25-0ubuntu0.12.04.21

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4454-2
https://usn.ubuntu.com/4454-1
CVE-2020-14303
—–BEGIN PGP SIGNATURE—–
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=ayYO
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4454-1
August 10, 2020

samba vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 20.04 LTS
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

Samba could be made to crash if it received specially crafted network
traffic.

Software Description:
– samba: SMB/CIFS file, print, and login server for Unix

Details:

Martin von Wittich and Wilko Meyer discovered that Samba incorrectly
handled certain empty UDP packets when being used as a AD DC NBT server. A
remote attacker could possibly use this issue to cause Samba to crash,
resulting in a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
samba 2:4.11.6+dfsg-0ubuntu1.4

Ubuntu 18.04 LTS:
samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.18

Ubuntu 16.04 LTS:
samba 2:4.3.11+dfsg-0ubuntu0.16.04.29

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/4454-1
CVE-2020-14303

Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.11.6+dfsg-0ubuntu1.4
https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2.18
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.29

—–BEGIN PGP SIGNATURE—–
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=ostt
—–END PGP SIGNATURE—–

AutorFilip Omazic
Cert idNCERT-REF-2020-08-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskih paketa Java 1.7.1 i 1.8.0 IBM

Otkriveni su sigurnosni nedostaci u programskim paketima Java 1.7.1 i 1.8.0 IBM za operacijski sustav RHEL. Otkriveni nedostaci potencijalnim napadačima...

Close