USN-4510-2: Samba vulnerability
17 September 2020
Samba would allow unintended access to files over the network.
Releases
Packages
- samba - SMB/CIFS file, print, and login server for Unix
Details
USN-4510-1 fixed a vulnerability in Samba. This update provides
the corresponding update for Ubuntu 14.04 ESM.
Original advisory details:
Tom Tervoort discovered that the Netlogon protocol implemented by Samba
incorrectly handled the authentication scheme. A remote attacker could use
this issue to forge an authentication token and steal the credentials of
the domain admin.
This update fixes the issue by changing the "server schannel" setting to
default to "yes", instead of "auto", which will force a secure netlogon
channel. This may result in compatibility issues with older devices. A
future update may allow a finer-grained control over this setting.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 14.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-4510-1: libpam-winbind, python-samba, libwbclient0, registry-tools, samba-common, libsmbclient, winbind, samba-libs, samba-dsdb-modules, smbclient, libnss-winbind, samba-common-bin, samba-dev, samba-vfs-modules, libwbclient-dev, libsmbclient-dev, ctdb, samba, samba-testsuite, libparse-pidl-perl
- USN-4559-1: libpam-winbind, python-samba, libwbclient0, python3-samba, registry-tools, samba-common, libsmbclient, winbind, samba-libs, samba-dsdb-modules, smbclient, libnss-winbind, samba-common-bin, samba-dev, samba-vfs-modules, libwbclient-dev, libsmbclient-dev, ctdb, samba, samba-testsuite, libparse-pidl-perl