Home / mailingsPDF  

[USN-2950-1] Samba vulnerabilities

Posted on 18 April 2016
Ubuntu Security

==========================
==========================
========================
Ubuntu Security Notice USN-2950-1
April 18, 2016

samba vulnerabilities
==========================
==========================
========================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.10
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

Several security issues were fixed in Samba.

Software Description:
- samba: SMB/CIFS file, print, and login server for Unix

Details:

Jouni Knuutinen discovered that Samba contained multiple flaws in the
DCE/RPC implementation. A remote attacker could use this issue to perform=

a denial of service, downgrade secure connections by performing a man in
the middle attack, or possibly execute arbitrary code. (CVE-2015-5370)

Stefan Metzmacher discovered that Samba contained multiple flaws in the
NTLMSSP authentication implementation. A remote attacker could use this
issue to downgrade connections to plain text by performing a man in the
middle attack. (CVE-2016-2110)

Alberto Solino discovered that a Samba domain controller would establish =
a
secure connection to a server with a spoofed computer name. A remote
attacker could use this issue to obtain sensitive information.
(CVE-2016-2111)

Stefan Metzmacher discovered that the Samba LDAP implementation did not
enforce integrity protection. A remote attacker could use this issue to
hijack LDAP connections by performing a man in the middle attack.
(CVE-2016-2112)

Stefan Metzmacher discovered that Samba did not validate TLS certificates=
=2E
A remote attacker could use this issue to spoof a Samba server.
(CVE-2016-2113)

Stefan Metzmacher discovered that Samba did not enforce SMB signing even =
if
configured to. A remote attacker could use this issue to perform a man in=

the middle attack. (CVE-2016-2114)

Stefan Metzmacher discovered that Samba did not enable integrity protecti=
on
for IPC traffic. A remote attacker could use this issue to perform a man =
in
the middle attack. (CVE-2016-2115)

Stefan Metzmacher discovered that Samba incorrectly handled the MS-SAMR a=
nd
MS-LSAD protocols. A remote attacker could use this flaw with a man in th=
e
middle attack to impersonate users and obtain sensitive information from
the Security Account Manager database. This flaw is known as Badlock.
(CVE-2016-2118)

Samba has been updated to 4.3.8 in Ubuntu 14.04 LTS and Ubuntu 15.10.
Ubuntu 12.04 LTS has been updated to 3.6.25 with backported security fixe=
s.

In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes. Configuration changes ma=
y
be required in certain environments.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.10:
samba 2:4.3.8+dfsg-0ubuntu0.15.10.2

Ubuntu 14.04 LTS:
samba 2:4.3.8+dfsg-0ubuntu0.14.04.2

Ubuntu 12.04 LTS:
samba 2:3.6.25-0ubuntu0.12.04.2

This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes.

References:
http://www.ubuntu.com/usn/usn-2950-1
CVE-2015-5370, CVE-2016-2110, CVE-2016-2111, CVE-2016-2112,
CVE-2016-2113, CVE-2016-2114, CVE-2016-2115, CVE-2016-2118

Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.3.8+dfsg-0ubuntu0.15.10.=
2
https://launchpad.net/ubuntu/+source/samba/2:4.3.8+dfsg-0ubuntu0.14.04.=
2
https://launchpad.net/ubuntu/+source/samba/2:3.6.25-0ubuntu0.12.04.2

 

TOP