SB2016030802 - Slackware Linux update for samba



SB2016030802 - Slackware Linux update for samba

Published: March 8, 2016 Updated: May 6, 2017

Security Bulletin ID SB2016030802
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Incorrect ACL get/set allowed on symlink path (CVE-ID: CVE-2015-7560)

The vulnerability allows a remote attacker to launch a symlink attack.

The vulnerability exists in Samba. A remote authenticated attacker can overwrite access control lists on the directory by creating a symbolic link to a file or directory using SMB1 UNIX extensions and then issuing a non-UNIX SMB1.

Successful exploitation of this vulnerability may result in a symlink attack.

2) Buffer overflow (CVE-ID: CVE-2016-0771)

The vulnerability allows a remote authenticated user to #BASIC_IMPACT#.

The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record.


Remediation

Install update from vendor's website.