USN-3426-2: Samba vulnerabilities
2 November 2017
Several security issues were fixed in XXX-APP-XXX.
Releases
Packages
- samba - SMB/CIFS file, print, and login server for Unix
Details
USN-3426-1 fixed several vulnerabilities in Samba. This update
provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Stefan Metzmacher discovered that Samba incorrectly enforced SMB signing in
certain situations. A remote attacker could use this issue to perform a
machine-in-the-middle attack. (CVE-2017-12150)
Yihan Lian and Zhibin Hu discovered that Samba incorrectly handled memory
when SMB1 is being used. A remote attacker could possibly use this issue to
obtain server memory contents. (CVE-2017-12163)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3426-1: python-samba, libsmbclient-dev, libpam-smbpass, samba-common, samba-vfs-modules, samba-dsdb-modules, samba-dev, libsmbclient, smbclient, samba-libs, registry-tools, libpam-winbind, samba-testsuite, winbind, samba-doc, libnss-winbind, ctdb, libparse-pidl-perl, libsmbsharemodes0, libwbclient-dev, libwbclient0, samba, libsmbsharemodes-dev, samba-common-bin