Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2017-12163 |
CWE-ID | CWE-401 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
samba (Alpine package) Operating systems & Components / Operating system package or component |
Vendor | Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU8518
Risk: Low
CVSSv3.1: 4.7 [CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-12163
CWE-ID:
CWE-401 - Missing release of memory after effective lifetime
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to memory information leak over SMB1. A client with write access to a share can cause server memory contents to be written into a file
or printer. Some SMB1
write requests were not correctly range checked to ensure the client
had sent enough data to fulfill the write, allowing server memory
contents to be written into the file (or printer) instead of client
supplied data. The client cannot control the area of the server memory
that is written to the file (or printer).
Install update from vendor's website.
Vulnerable software versionssamba (Alpine package): 3.4.8-r0 - 4.4.14-r1
External linkshttp://git.alpinelinux.org/aports/commit/?id=4013d75e416cb0c1c59bbb3f7ac07d1db141473a
http://git.alpinelinux.org/aports/commit/?id=1c38a7f3b9cd01ff44f483b6f375aee36076925c
http://git.alpinelinux.org/aports/commit/?id=d07f3a244e0806b4e3fe99e12c4d9ddc9a07f8b0
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.