Advisories ยป MGASA-2016-0151

Updated samba packages fix security vulnerabilities

Publication date: 26 Apr 2016
Modification date: 26 Apr 2016
Type: security
Affected Mageia releases : 5
CVE: CVE-2015-5370 , CVE-2016-2110 , CVE-2016-2111 , CVE-2016-2112 , CVE-2016-2115 , CVE-2016-2118

Description

Updated samba packages fix security vulnerability:

Jouni Knuutinen discovered that Samba contained multiple flaws in the
DCE/RPC implementation. A remote attacker could use this issue to perform
a denial of service, downgrade secure connections by performing a man in
the middle attack, or possibly execute arbitrary code (CVE-2015-5370).

Stefan Metzmacher discovered that Samba contained multiple flaws in the
NTLMSSP authentication implementation. A remote attacker could use this
issue to downgrade connections to plain text by performing a man in the
middle attack (CVE-2016-2110).

Alberto Solino discovered that a Samba domain controller would establish a
secure connection to a server with a spoofed computer name. A remote
attacker could use this issue to obtain sensitive information
(CVE-2016-2111).

Stefan Metzmacher discovered that the Samba LDAP implementation did not
enforce integrity protection. A remote attacker could use this issue to
hijack LDAP connections by performing a man in the middle attack
(CVE-2016-2112).

Stefan Metzmacher discovered that Samba did not enable integrity protection
for IPC traffic. A remote attacker could use this issue to perform a man in
the middle attack (CVE-2016-2115).

Stefan Metzmacher discovered that Samba incorrectly handled the MS-SAMR and
MS-LSAD protocols. A remote attacker could use this flaw with a man in the
middle attack to impersonate users and obtain sensitive information from
the Security Account Manager database. This flaw is known as Badlock
(CVE-2016-2118).
                

References

SRPMS

5/core