Lucene search

K
debianDebianDEBIAN:DLA-1110-1:295F9
HistorySep 25, 2017 - 9:30 a.m.

[SECURITY] [DLA 1110-1] samba security update

2017-09-2509:30:08
lists.debian.org
11

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

7.3 High

AI Score

Confidence

Low

0.629 Medium

EPSS

Percentile

97.9%

Package : samba
Version : 2:3.6.6-6+deb7u14
CVE ID : CVE-2017-12150 CVE-2017-12163

CVE-2017-12150

Stefan Metzmacher discovered multiple code paths where SMB signing
was not enforced.

CVE-2017-12163

Yihan Lian and Zhibin Hu discovered that insufficient range checks
in the processing of SMB1 write requests could result in disclosure
of server memory.

For Debian 7 "Wheezy", these problems have been fixed in version
2:3.6.6-6+deb7u14.

We recommend that you upgrade your samba packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
Attachment:
signature.asc
Description: PGP signature

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

7.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

7.3 High

AI Score

Confidence

Low

0.629 Medium

EPSS

Percentile

97.9%