MGASA-2018-0022

Source
https://advisories.mageia.org/MGASA-2018-0022.html
Import Source
https://advisories.mageia.org/MGASA-2018-0022.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2018-0022
Related
Published
2018-01-02T16:25:41Z
Modified
2018-01-02T16:01:05Z
Summary
Updated samba packages fix security vulnerability
Details

Stefan Metzmacher discovered that Samba incorrectly enforced SMB signing in certain situations. A remote attacker could use this issue to perform a man in the middle attack. (CVE-2017-12150)

Yihan Lian and Zhibin Hu discovered that Samba incorrectly handled memory when SMB1 is being used. A remote attacker could possibly use this issue to obtain server memory contents. (CVE-2017-12163)

Volker Lendecke discovered that Samba incorrectly cleared memory when returning data to a client. A remote attacker could possibly use this issue to obtain sensitive information. (CVE-2017-15275)

References
Credits

Affected packages

Mageia:5 / samba

Package

Name
samba
Purl
pkg:rpm/mageia/samba?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.25-2.8.mga5

Ecosystem specific

{
    "section": "core"
}