Updated samba packages fix security vulnerabilities
Publication date: 13 Apr 2018Modification date: 13 Apr 2018
Type: security
Affected Mageia releases : 5 , 6
CVE: CVE-2018-1050 , CVE-2018-1057
Description
It was discovered that Samba is prone to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon (CVE-2018-1050). Bjoern Baumbach from Sernet discovered that on Samba 4 AD DC the LDAP server incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users passwords, including administrative users (CVE-2018-1057). Note that Mageia 5 was only affected by the CVE-2018-1050 issue.
References
- https://bugs.mageia.org/show_bug.cgi?id=22765
- https://www.samba.org/samba/security/CVE-2018-1050.html
- https://www.samba.org/samba/security/CVE-2018-1057.html
- https://www.debian.org/security/2018/dsa-4135
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1057
SRPMS
6/core
- samba-4.6.12-1.1.mga6
5/core
- samba-3.6.25-2.9.mga5