http://www.mandriva.com/en/
______________________________
Package : samba4
Date : March 28, 2015
Affected: Business Server 2.0
______________________________
Problem Description:
Multiple vulnerabilities has been discovered and corrected in samba4:
Samba 4.0.x before 4.0.24, 4.1.x before 4.1.16, and 4.2.x before
4.2rc4, when an Active Directory Domain Controller (AD DC)
is configured, allows remote authenticated users to set the LDB
userAccountControl UF_SERVER_TRUST_ACCOUNT bit, and consequently gain
privileges, by leveraging delegation of authority for user-account
or computer-account creation (CVE-2014-8143).
An uninitialized pointer use flaw was found in the Samba daemon
(smbd). A malicious Samba client could send specially crafted netlogon
packets that, when processed by smbd, could potentially lead to
arbitrary code execution with the privileges of the user running smbd
(by default, the root user) (CVE-2015-0240).
The updated packages provides a solution for these security issues.
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
https://www.samba.org/samba/
https://www.samba.org/samba/
https://www.samba.org/samba/
https://www.samba.org/samba/
https://www.samba.org/samba/
______________________________
Updated Packages:
Mandriva Business Server 2/X86_64:
7a21c3baa011c68360bcaa5a086d01
e67ad9bd1020e4de0afa2b91c29fc9
46ed288d10dd123272dd812ae56ec6
1a4f3437669ca98899dfcdf2e88818
cea478050042fea1d543c6988dc9e5
078bdb566527115b87ae84051af53f
f907110b336f2151532d332a967044
9f02113c351530d89f660c57ad738e
a4ee31b7ca1c9c10840b5128780c10
361e64104d96f176acb1ea2b7a7dca
728fe28155e9ea617eb7b3e8c1f815
f95961c85294f2eb4e67412c333a86
20260736d550aed06b930a80378f1a
ba87fe4573774f2b6d39eb244906b8
77d4df40799cb8b265bf04e948cb4c
0473c05efdc448e87195f0162e106a
0c947489754bd227bb70f4d13e42ac
3a6a91b25a097b2aee84dbd05b628f
302dd7340f910fac0a6d185ebac1c7
3954449c55b63201fb6c82e123f424
e30ce619fe04c7005bade1fb2051cd
b7a4a89d736ebde71080926777ebf1
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą