MGASA-2017-0145

Source
https://advisories.mageia.org/MGASA-2017-0145.html
Import Source
https://advisories.mageia.org/MGASA-2017-0145.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2017-0145
Related
Published
2017-05-25T14:37:42Z
Modified
2017-05-25T14:26:37Z
Summary
Updated samba packages fix security vulnerability
Details

A flaw was found in the way Samba handled PAC (Privilege Attribute Certificate) checksums. A remote, authenticated attacker could use this flaw to crash the winbindd process (CVE-2016-2126).

Jann Horn discovered that Samba incorrectly handled symlinks. An authenticated remote attacker could use this issue to access files on the server outside of the exported directories (CVE-2017-2619).

A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root (CVE-2017-7494).

References
Credits

Affected packages

Mageia:5 / samba

Package

Name
samba
Purl
pkg:rpm/mageia/samba?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.25-2.7.mga5

Ecosystem specific

{
    "section": "core"
}