MGASA-2018-0201

Source
https://advisories.mageia.org/MGASA-2018-0201.html
Import Source
https://advisories.mageia.org/MGASA-2018-0201.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2018-0201
Related
Published
2018-04-13T20:08:48Z
Modified
2018-04-13T19:36:36Z
Summary
Updated samba packages fix security vulnerabilities
Details

It was discovered that Samba is prone to a denial of service attack when the RPC spoolss service is configured to be run as an external daemon (CVE-2018-1050).

Bjoern Baumbach from Sernet discovered that on Samba 4 AD DC the LDAP server incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users passwords, including administrative users (CVE-2018-1057).

Note that Mageia 5 was only affected by the CVE-2018-1050 issue.

References
Credits

Affected packages

Mageia:5 / samba

Package

Name
samba
Purl
pkg:rpm/mageia/samba?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.25-2.9.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:6 / samba

Package

Name
samba
Purl
pkg:rpm/mageia/samba?distro=mageia-6

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.6.12-1.1.mga6

Ecosystem specific

{
    "section": "core"
}