Your submission was sent successfully! Close

USN-5174-1: Samba vulnerabilities

6 December 2021

Several security issues were fixed in Samba.

Releases

Packages

  • samba - SMB/CIFS file, print, and login server for Unix

Details

Stefan Metzmacher discovered that Samba incorrectly handled SMB1 client
connections. A remote attacker could possibly use this issue to downgrade
connections to plaintext authentication. (CVE-2016-2124)

Andrew Bartlett discovered that Samba incorrectly mapping domain users to
local users. An authenticated attacker could possibly use this issue to
become root on domain members. (CVE-2020-25717)

Andrew Bartlett discovered that Samba did not properly check sensitive
attributes. An authenticated attacker could possibly use this issue to
escalate privileges. (CVE-2020-25722)

Joseph Sutton discovered that Samba incorrectly handled certain TGS
requests. An authenticated attacker could possibly use this issue to cause
Samba to crash, resulting in a denial of service. (CVE-2021-3671)

The fix for CVE-2020-25717 results in possible behaviour changes that could
affect certain environments. Please see the upstream advisory for more
information:

https://www.samba.org/samba/security/CVE-2020-25717.html

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04

In general, a standard system update will make all the necessary changes.

Related notices

  • USN-5142-1: libnss-winbind, libsmbclient, python3-samba, libwbclient0, libwbclient-dev, samba-dev, registry-tools, ctdb, samba-vfs-modules, samba-common, libpam-winbind, libsmbclient-dev, winbind, samba-common-bin, samba-dsdb-modules, samba-testsuite, samba, samba-libs, smbclient