==========================================================================
Ubuntu Security Notice USN-3426-1
September 21, 2017
samba vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 17.04
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS
Summary:
Samba could be made to expose sensitive information over the network.
Software Description:
– samba: SMB/CIFS file, print, and login server for Unix
Details:
Stefan Metzmacher discovered that Samba incorrectly enforced SMB signing in
certain situations. A remote attacker could use this issue to perform a man
in the middle attack. (CVE-2017-12150)
Stefan Metzmacher discovered that Samba incorrectly handled encryption
across DFS redirects. A remote attacker could use this issue to perform a
man in the middle attack. (CVE-2017-12151)
Yihan Lian and Zhibin Hu discovered that Samba incorrectly handled memory
when SMB1 is being used. A remote attacker could possibly use this issue to
obtain server memory contents. (CVE-2017-12163)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 17.04:
samba 2:4.5.8+dfsg-0ubuntu0.17.04.7
Ubuntu 16.04 LTS:
samba 2:4.3.11+dfsg-0ubuntu0.16.04.11
Ubuntu 14.04 LTS:
samba 2:4.3.11+dfsg-0ubuntu0.14.04.12
In general, a standard system update will make all the necessary changes.
References:
https://www.ubuntu.com/usn/usn-3426-1
CVE-2017-12150, CVE-2017-12151, CVE-2017-12163
Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.5.8+dfsg-0ubuntu0.17.04.7
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04.11
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.14.04.12
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2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=GK+b
—–END PGP SIGNATURE—–
—