SB2016030802 - Slackware Linux update for samba
Published: March 8, 2016 Updated: May 6, 2017
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Incorrect ACL get/set allowed on symlink path (CVE-ID: CVE-2015-7560)
The vulnerability allows a remote attacker to launch a symlink attack.The vulnerability exists in Samba. A remote authenticated attacker can overwrite access control lists on the directory by creating a symbolic link to a file or directory using SMB1 UNIX extensions and then issuing a non-UNIX SMB1.
Successful exploitation of this vulnerability may result in a symlink attack.
2) Buffer overflow (CVE-ID: CVE-2016-0771)
The vulnerability allows a remote authenticated user to #BASIC_IMPACT#.
The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record.
Remediation
Install update from vendor's website.