USN-3426-2: Samba vulnerabilities
2 November 2017
Several security issues were fixed in XXX-APP-XXX.
Releases
Packages
- samba - SMB/CIFS file, print, and login server for Unix
Details
USN-3426-1 fixed several vulnerabilities in Samba. This update
provides the corresponding update for Ubuntu 12.04 ESM.
Original advisory details:
Stefan Metzmacher discovered that Samba incorrectly enforced SMB signing in
certain situations. A remote attacker could use this issue to perform a
machine-in-the-middle attack. (CVE-2017-12150)
Yihan Lian and Zhibin Hu discovered that Samba incorrectly handled memory
when SMB1 is being used. A remote attacker could possibly use this issue to
obtain server memory contents. (CVE-2017-12163)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3426-1: libparse-pidl-perl, samba-doc, ctdb, libsmbsharemodes-dev, libpam-winbind, samba, libpam-smbpass, samba-common-bin, samba-dev, smbclient, registry-tools, libsmbclient, libsmbsharemodes0, winbind, python-samba, libnss-winbind, samba-dsdb-modules, libwbclient-dev, samba-libs, samba-common, samba-testsuite, libwbclient0, samba-vfs-modules, libsmbclient-dev