Debian DSA-4345-1 : samba - security update

medium Nessus Plugin ID 119268

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix. The Common Vulnerabilities and Exposures project identifies the following issues :

- CVE-2018-14629 Florian Stuelpner discovered that Samba is vulnerable to infinite query recursion caused by CNAME loops, resulting in denial of service.

https://www.samba.org/samba/security/CVE-2018-14629.html

- CVE-2018-16841 Alex MacCuish discovered that a user with a valid certificate or smart card can crash the Samba AD DC's KDC when configured to accept smart-card authentication.

https://www.samba.org/samba/security/CVE-2018-16841.html

- CVE-2018-16851 Garming Sam of the Samba Team and Catalyst discovered a NULL pointer dereference vulnerability in the Samba AD DC LDAP server allowing a user able to read more than 256MB of LDAP entries to crash the Samba AD DC's LDAP server.

https://www.samba.org/samba/security/CVE-2018-16851.html

Solution

Upgrade the samba packages.

For the stable distribution (stretch), these problems have been fixed in version 2:4.5.12+dfsg-2+deb9u4.

See Also

https://security-tracker.debian.org/tracker/CVE-2018-14629

https://www.samba.org/samba/security/CVE-2018-14629.html

https://security-tracker.debian.org/tracker/CVE-2018-16841

https://www.samba.org/samba/security/CVE-2018-16841.html

https://security-tracker.debian.org/tracker/CVE-2018-16851

https://www.samba.org/samba/security/CVE-2018-16851.html

https://security-tracker.debian.org/tracker/source-package/samba

https://packages.debian.org/source/stretch/samba

https://www.debian.org/security/2018/dsa-4345

Plugin Details

Severity: Medium

ID: 119268

File Name: debian_DSA-4345.nasl

Version: 1.4

Type: local

Agent: unix

Published: 11/29/2018

Updated: 7/18/2024

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3.1

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P

CVSS Score Source: CVE-2018-16851

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:samba, cpe:/o:debian:debian_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/27/2018

Vulnerability Publication Date: 11/28/2018

Reference Information

CVE: CVE-2018-14629, CVE-2018-16841, CVE-2018-16851

DSA: 4345