Описание
Security update for samba
This update for samba fixes the following issues:
Security issues fixed:
- CVE-2016-2125: Don't send delegated credentials to all servers. (bsc#1014441).
- CVE-2016-2126: Denial of service due to a client triggered crash in the winbindd parent process. (bsc#1014442).
- CVE-2016-2123: Heap-based Buffer Overflow Remote Code Execution Vulnerability. (bsc#1014437). This issue does not affect our packages, as the component is not built.
Non security issues fixed:
- s3/client: obey 'disable netbios' smb.conf param, don't connect via NBT port (bsc#1009085)
- Add doc changes for net ads --no-dns-updates switch (bsc#991564)
- Include vfstest in samba-test (bsc#1001203).
- s3/winbindd: using default domain with user@domain.com format fails (bsc#997833).
- Fix illegal memory access after memory has been deleted (bsc#975299).
- Fix bug in tevent poll backend causing winbind to loop tightly (bsc#994500).
- Various fixes for spnego/ntlm (bsc#986675).
Список пакетов
SUSE Linux Enterprise High Availability Extension 12
SUSE Linux Enterprise Server 12-LTSS
SUSE Linux Enterprise Server for SAP Applications 12
Ссылки
- Link for SUSE-SU-2016:3299-1
- E-Mail link for SUSE-SU-2016:3299-1
- SUSE Security Ratings
- SUSE Bug 1001203
- SUSE Bug 1009085
- SUSE Bug 1014437
- SUSE Bug 1014441
- SUSE Bug 1014442
- SUSE Bug 975299
- SUSE Bug 986675
- SUSE Bug 991564
- SUSE Bug 994500
- SUSE Bug 997833
- SUSE CVE CVE-2016-2123 page
- SUSE CVE CVE-2016-2125 page
- SUSE CVE CVE-2016-2126 page
Описание
A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation.
Затронутые продукты
Ссылки
- CVE-2016-2123
- SUSE Bug 1014437
Описание
It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users.
Затронутые продукты
Ссылки
- CVE-2016-2125
- SUSE Bug 1014441
Описание
Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
Затронутые продукты
Ссылки
- CVE-2016-2126
- SUSE Bug 1014442