rhsa-2014_0009
Vulnerability from csaf_redhat
Published
2014-01-06 18:32
Modified
2024-11-05 18:17
Summary
Red Hat Security Advisory: samba security update
Notes
Topic
Updated samba packages that fix two security issues are now available for
Red Hat Storage.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Samba is an open-source implementation of the Server Message Block (SMB) or
Common Internet File System (CIFS) protocol, which allows PC-compatible
machines to share files, printers, and other information.
A heap-based buffer overflow flaw was found in the DCE-RPC client code in
Samba. A specially crafted DCE-RPC packet could cause various Samba
programs to crash or, possibly, execute arbitrary code when parsed.
A malicious or compromised Active Directory Domain Controller could use
this flaw to compromise the winbindd daemon running with root privileges.
(CVE-2013-4408)
A flaw was found in the way Samba performed ACL checks on alternate file
and directory data streams. An attacker able to access a CIFS share with
alternate stream support enabled could access alternate data streams
regardless of the underlying file or directory ACL permissions.
(CVE-2013-4475)
Red Hat would like to thank the Samba project for reporting CVE-2013-4408.
Upstream acknowledges Stefan Metzmacher and Michael Adam of SerNet as the
original reporters of this issue.
All users of Red Hat Storage are advised to upgrade to these updated
packages, which contain backported patches to correct these issues. After
installing this update, the smb service will be restarted automatically.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated samba packages that fix two security issues are now available for\nRed Hat Storage.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Samba is an open-source implementation of the Server Message Block (SMB) or\nCommon Internet File System (CIFS) protocol, which allows PC-compatible\nmachines to share files, printers, and other information.\n\nA heap-based buffer overflow flaw was found in the DCE-RPC client code in\nSamba. A specially crafted DCE-RPC packet could cause various Samba\nprograms to crash or, possibly, execute arbitrary code when parsed.\nA malicious or compromised Active Directory Domain Controller could use\nthis flaw to compromise the winbindd daemon running with root privileges.\n(CVE-2013-4408)\n\nA flaw was found in the way Samba performed ACL checks on alternate file\nand directory data streams. An attacker able to access a CIFS share with\nalternate stream support enabled could access alternate data streams\nregardless of the underlying file or directory ACL permissions.\n(CVE-2013-4475)\n\nRed Hat would like to thank the Samba project for reporting CVE-2013-4408.\nUpstream acknowledges Stefan Metzmacher and Michael Adam of SerNet as the\noriginal reporters of this issue.\n\nAll users of Red Hat Storage are advised to upgrade to these updated\npackages, which contain backported patches to correct these issues. After\ninstalling this update, the smb service will be restarted automatically.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:0009", "url": "https://access.redhat.com/errata/RHSA-2014:0009" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.samba.org/samba/security/CVE-2013-4408", "url": "http://www.samba.org/samba/security/CVE-2013-4408" }, { "category": "external", "summary": "http://www.samba.org/samba/security/CVE-2013-4475", "url": "http://www.samba.org/samba/security/CVE-2013-4475" }, { "category": "external", "summary": "1018032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018032" }, { "category": "external", "summary": "1024542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1024542" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0009.json" } ], "title": "Red Hat Security Advisory: samba security update", "tracking": { "current_release_date": "2024-11-05T18:17:37+00:00", "generator": { "date": "2024-11-05T18:17:37+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.1.1" } }, "id": "RHSA-2014:0009", "initial_release_date": "2014-01-06T18:32:38+00:00", "revision_history": [ { "date": "2014-01-06T18:32:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-01-06T18:32:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-05T18:17:37+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Storage Server 2.1", "product": { "name": "Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:storage:2.1:server:el6" } } } ], "category": "product_family", "name": "Red Hat Gluster Storage" }, { "branches": [ { "category": "product_version", "name": "samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-swat@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-winbind@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "samba-client-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-client-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-client-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-client@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-glusterfs@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debuginfo@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsmbclient-devel@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-winbind-krb5-locator@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-doc@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "samba-common-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-common-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-common-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-common@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libsmbclient@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-winbind-devel@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-domainjoin-gui@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "samba-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba@3.6.9-167.5.1.el6rhs?arch=x86_64" } } }, { "category": "product_version", "name": "samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64", "product": { "name": "samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64", "product_id": "samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-winbind-clients@3.6.9-167.5.1.el6rhs?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "samba-0:3.6.9-167.5.1.el6rhs.src", "product": { "name": "samba-0:3.6.9-167.5.1.el6rhs.src", "product_id": "samba-0:3.6.9-167.5.1.el6rhs.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba@3.6.9-167.5.1.el6rhs?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.6.9-167.5.1.el6rhs.src as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.src" }, "product_reference": "samba-0:3.6.9-167.5.1.el6rhs.src", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-client-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-client-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-common-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" }, { "category": "default_component_of", "full_product_name": { "name": "samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64 as a component of Red Hat Storage Server 2.1", "product_id": "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64" }, "product_reference": "samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64", "relates_to_product_reference": "6Server-RHS-6.4.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Samba project" ] } ], "cve": "CVE-2013-4408", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "discovery_date": "2013-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1018032" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "samba: Heap-based buffer overflow due to incorrect DCE-RPC fragment length field check", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue does not affect the version of samba as shipped with Red Hat Enterprise Linux 5.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.src", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4408" }, { "category": "external", "summary": "RHBZ#1018032", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1018032" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4408", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4408" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4408", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4408" } ], "release_date": "2013-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-06T18:32:38+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.src", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.src", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "samba: Heap-based buffer overflow due to incorrect DCE-RPC fragment length field check" }, { "cve": "CVE-2013-4475", "discovery_date": "2013-10-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1024542" } ], "notes": [ { "category": "description", "text": "Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS).", "title": "Vulnerability description" }, { "category": "summary", "text": "samba: no access check verification on stream files", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the samba package in Red Hat Enterprise Linux 5. This issue was addressed for the samba3x package in Red Hat Enterprise Linux 5 and the samba package in Red Hat Enterprise Linux 6 via https://rhn.redhat.com/errata/RHSA-2013-1806.html, and the samba package in Red Hat Storage via https://rhn.redhat.com/errata/RHSA-2014-0009.html", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.src", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2013-4475" }, { "category": "external", "summary": "RHBZ#1024542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1024542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2013-4475", "url": "https://www.cve.org/CVERecord?id=CVE-2013-4475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2013-4475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4475" }, { "category": "external", "summary": "http://www.samba.org/samba/security/CVE-2013-4475", "url": "http://www.samba.org/samba/security/CVE-2013-4475" } ], "release_date": "2013-10-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-01-06T18:32:38+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/site/articles/11258", "product_ids": [ "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.src", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:0009" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHS-6.4.z:libsmbclient-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:libsmbclient-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.src", "6Server-RHS-6.4.z:samba-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-client-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-common-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-debuginfo-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-doc-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-domainjoin-gui-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-glusterfs-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-swat-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-clients-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-devel-0:3.6.9-167.5.1.el6rhs.x86_64", "6Server-RHS-6.4.z:samba-winbind-krb5-locator-0:3.6.9-167.5.1.el6rhs.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "samba: no access check verification on stream files" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.