Vulnerability & Exploit Database

Back to search

RHSA-2016:0011: samba security update

Severity CVSS Published Added Modified
5 (AV:N/AC:L/Au:N/C:P/I:N/A:N) December 29, 2015 January 18, 2016 March 21, 2018

Description

Samba is an open-source implementation of the Server Message Block (SMB) orCommon Internet File System (CIFS) protocol, which allows PC-compatiblemachines to share files, printers, and other information.A man-in-the-middle vulnerability was found in the way "connection signing"was implemented by Samba. A remote attacker could use this flaw todowngrade an existing Samba client connection and force the use of plaintext. (CVE-2015-5296)A missing access control flaw was found in Samba. A remote, authenticatedattacker could use this flaw to view the current snapshot on a Samba share,despite not having DIRECTORY_LIST access rights. (CVE-2015-5299)An access flaw was found in the way Samba verified symbolic links whencreating new files on a Samba share. A remote attacker could exploit thisflaw to gain access to files outside of Samba's share path. (CVE-2015-5252)Red Hat would like to thank the Samba project for reporting these issues.Upstream acknowledges Stefan Metzmacher of the Samba Team and Sernet.de asthe original reporters of CVE-2015-5296, partha@exablox.com as the originalreporter of CVE-2015-5299, Jan "Yenya" Kasprzak and the Computer SystemsUnit team at Faculty of Informatics, Masaryk University as the originalreporters of CVE-2015-5252.All samba users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. After installing thisupdate, the smb service will be restarted automatically.

Scan For This Vulnerability

Use our top-rated tool to discover, prioritize, and remediate your vulnerabilities

 Free InsightVM Trial

References

Solution

redhat-upgrade-libsmbclient

Related Vulnerabilities