![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.1.13.2023.216.02 |
Categoría: | Slackware Local Security Checks |
Título: | Slackware: Security Advisory (SSA:2023-216-02) |
Resumen: | The remote host is missing an update for the 'samba' package(s) announced via the SSA:2023-216-02 advisory. |
Descripción: | Summary: The remote host is missing an update for the 'samba' package(s) announced via the SSA:2023-216-02 advisory. Vulnerability Insight: New samba packages are available for Slackware 15.0 and -current to fix security issues. Here are the details from the Slackware 15.0 ChangeLog: +--------------------------+ patches/packages/samba-4.18.5-i586-1_slack15.0.txz: Upgraded. PLEASE NOTE: We are taking the unusual step of moving to the latest Samba branch because Windows has made changes that break Samba 4.15.x. The last 4.15.x will be retained in /pasture as a fallback. There may be some required configuration changes with this, but we've kept using MIT Kerberos to try to have the behavior change as little as possible. Upgrade carefully. This update fixes security issues: When winbind is used for NTLM authentication, a maliciously crafted request can trigger an out-of-bounds read in winbind and possibly crash it. SMB2 packet signing is not enforced if an admin configured 'server signing = required' or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. An infinite loop bug in Samba's mdssvc RPC service for Spotlight can be triggered by an unauthenticated attacker by issuing a malformed RPC request. Missing type validation in Samba's mdssvc RPC service for Spotlight can be used by an unauthenticated attacker to trigger a process crash in a shared RPC mdssvc worker process. As part of the Spotlight protocol Samba discloses the server-side absolute path of shares and files and directories in search results. For more information, see: [links moved to references] (* Security fix *) +--------------------------+ Affected Software/OS: 'samba' package(s) on Slackware 15.0, Slackware current. Solution: Please install the updated package(s). CVSS Score: 7.8 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-2127 RHBZ#2222791 https://bugzilla.redhat.com/show_bug.cgi?id=2222791 RHSA-2023:6667 https://access.redhat.com/errata/RHSA-2023:6667 RHSA-2023:7139 https://access.redhat.com/errata/RHSA-2023:7139 RHSA-2024:0423 https://access.redhat.com/errata/RHSA-2024:0423 RHSA-2024:0580 https://access.redhat.com/errata/RHSA-2024:0580 https://access.redhat.com/security/cve/CVE-2022-2127 https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/ https://security.netapp.com/advisory/ntap-20230731-0010/ https://www.debian.org/security/2023/dsa-5477 https://www.samba.org/samba/security/CVE-2022-2127.html Common Vulnerability Exposure (CVE) ID: CVE-2023-3347 RHBZ#2222792 https://bugzilla.redhat.com/show_bug.cgi?id=2222792 RHSA-2023:4325 https://access.redhat.com/errata/RHSA-2023:4325 RHSA-2023:4328 https://access.redhat.com/errata/RHSA-2023:4328 https://access.redhat.com/security/cve/CVE-2023-3347 https://www.samba.org/samba/security/CVE-2023-3347.html Common Vulnerability Exposure (CVE) ID: CVE-2023-34966 RHBZ#2222793 https://bugzilla.redhat.com/show_bug.cgi?id=2222793 https://access.redhat.com/security/cve/CVE-2023-34966 https://www.samba.org/samba/security/CVE-2023-34966 Common Vulnerability Exposure (CVE) ID: CVE-2023-34967 RHBZ#2222794 https://bugzilla.redhat.com/show_bug.cgi?id=2222794 https://access.redhat.com/security/cve/CVE-2023-34967 https://www.samba.org/samba/security/CVE-2023-34967.html Common Vulnerability Exposure (CVE) ID: CVE-2023-34968 RHBZ#2222795 https://bugzilla.redhat.com/show_bug.cgi?id=2222795 https://access.redhat.com/security/cve/CVE-2023-34968 https://www.samba.org/samba/security/CVE-2023-34968.html |
Copyright | Copyright (C) 2023 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |