http://www.mandriva.com/en/
______________________________
Package : samba
Date : March 28, 2015
Affected: Business Server 2.0
______________________________
Problem Description:
Updated samba packages fix security vulnerabilities:
In Samba before 3.6.23, the SAMR server neglects to ensure that
attempted password changes will update the bad password count, and does
not set the lockout flags. This would allow a user unlimited attempts
against the password by simply calling ChangePasswordUser2 repeatedly.
This is available without any other authentication (CVE-2013-4496).
Information leak vulnerability in the VFS code, allowing an
authenticated user to retrieve eight bytes of uninitialized memory
when shadow copy is enabled (CVE-2014-0178).
Samba versions before 3.6.24, 4.0.19, and 4.1.9 are vulnerable
to a denial of service on the nmbd NetBIOS name services daemon. A
malformed packet can cause the nmbd server to loop the CPU and prevent
any further NetBIOS ame service (CVE-2014-0244).
Samba versions before 3.6.24, 4.0.19, and 4.1.9 are affected
by a denial of service crash involving overwriting memory on an
authenticated connection to the smbd file server (CVE-2014-3493).
An uninitialized pointer use flaw was found in the Samba daemon
(smbd). A malicious Samba client could send specially crafted netlogon
packets that, when processed by smbd, could potentially lead to
arbitrary code execution with the privileges of the user running smbd
(by default, the root user) (CVE-2015-0240).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
http://advisories.mageia.org/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 2/X86_64:
d5eebcafd60491a0234a65d554fe82
00e4940a6c0d55c938244e089d4350
a8d521d5ff42f668b2701e5930f47e
fb75164165fce2046f92160cfaf1a0
d18bb1a8d87c85a525dc604b09790a
186cef9f46545399665b85f43fbed4
952887304f08621ae17d2a80f5bff8
fd1b2a84abeddad8d700fd2f03044b
22141daaf825543f94ac3d717c7fc5
83167c8ea7e8fafee55988ad3bbf0c
d02c7826925091daf21f612a491f3d
747f22b55716d64c3f8c68dc4f644f
7b4bb64285d633bcf7ee027c741123
ae8b375a7415d5f18654a5771639cb
5e93bbf392bb83baa9a6eff2fd4975
4cf2f7bbebc7d62840514ae984c6c6
34c333a6ddc9c59fe446cddf67120f
a126f6022cd26bc032282cab61dc09
a5d673260f527fd58519dbcd62950b
49592172e00aee408edcccc73b3cde
546147333706f85b79bc5a7390c989
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą