Lucene search

K
debianDebianDEBIAN:DLA-379-1:5D330
HistoryJan 03, 2016 - 3:25 p.m.

[SECURITY] [DLA 379-1] samba security update

2016-01-0315:25:38
lists.debian.org
34

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

AI Score

7.3

Confidence

High

EPSS

0.013

Percentile

85.7%

Package : samba
Version : 2:3.5.6~dfsg-3squeeze13
CVE ID : CVE-2015-5252 CVE-2015-5296 CVE-2015-5299

Several vulnerabilities were found in Samba, a SMB/CIFS implementation
that provides a file, print, and login server.

CVE-2015-5252

Jan "Yenya" Kasprzak and the Computer Systems Unit team at Faculty
of Informatics, Masaryk University, reported that samba wrongly
verified symlinks, making it possible to access resources outside
the shared path, under certain circumstances.

CVE-2015-5296

Stefan Metzmacher of SerNet and the Samba Team discovered that samba
did not ensure that signing was negotiated when a client established
an encrypted connection against a samba server.

CVE-2015-5299

Samba was vulnerable to a missing access control check in the
VFS shadow_copy2 module, that could allow unauthorized users to
access snapshots.

For Debian 6 "Squeeze", this issue has been fixed in samba version
2:3.5.6~dfsg-3squeeze13. We recommend you to upgrade your samba
packages.

Learn more about the Debian Long Term Support (LTS) Project and how to
apply these updates at: https://wiki.debian.org/LTS/
Attachment:
signature.asc
Description: PGP signature

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

AI Score

7.3

Confidence

High

EPSS

0.013

Percentile

85.7%