Gentoo Linux Security Advisory 201502-15 - Multiple vulnerabilities have been found in Samba, the worst of which allowing a context-dependent attacker to bypass intended file restrictions, cause a Denial of Service or execute arbitrary code. Versions less than 3.6.25 are affected.
606c956ce8f163cd743c45062fd6201fce247d72cbe7bc650aed2d2440e1861b
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201502-15
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Samba: Multiple vulnerabilities
Date: February 25, 2015
Bugs: #479868, #491070, #493664, #504494, #511764, #514676, #541182
ID: 201502-15
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Samba, the worst of which
allowing a context-dependent attacker to bypass intended file
restrictions, cause a Denial of Service or execute arbitrary code.
Background
==========
Samba is a suite of SMB and CIFS client/server programs.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-fs/samba < 3.6.25 >= 3.6.25
Description
===========
Multiple vulnerabilities have been discovered in Samba. Please review
the CVE identifiers referenced below for details.
Impact
======
A context-dependent attacker may be able to execute arbitrary code,
cause a Denial of Service condition, bypass intended file restrictions,
or obtain sensitive information.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Samba users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-fs/samba-3.6.25"
References
==========
[ 1 ] CVE-2012-6150
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6150
[ 2 ] CVE-2013-4124
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4124
[ 3 ] CVE-2013-4408
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4408
[ 4 ] CVE-2013-4475
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4475
[ 5 ] CVE-2013-4476
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4476
[ 6 ] CVE-2013-4496
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4496
[ 7 ] CVE-2014-0178
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0178
[ 8 ] CVE-2014-0239
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0239
[ 9 ] CVE-2014-0244
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0244
[ 10 ] CVE-2014-3493
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3493
[ 11 ] CVE-2015-0240
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0240
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/glsa-201502-15.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCgAGBQJU7kePAAoJEP7VAChXwav6PFsH/0UBqHBs9RhNTHwIUVCm4lOe
3lbV1rlOX1bpWPCFjVd5GugB11aLSNp7BdtLM09mLEvO3J2B9dsWEdxJu4PVMfhR
dkGnuYqUDxmfVdEZ20Ne5ZLih2cJBsakQzobG8CXyZ4WVyFdbPO4VnplHoH/PZRa
uw3/RaEjd6iDDHeCC+9R2Pnpjt/ME1Z0XTlVdQWCTnrxW3P0e2gMUXEgZhVUYrT5
DryKK/ksUo7n6rktux4TVsnX3lsYQ3f2x3BNkkZYr1uFfeDPhm3o1V4519pkJviU
LUvDgNQm4OtsEzRy71OCUnEIl8MehrNRWIqGSlqfJ8ZAO6jz2s/ZZAH8ph5Zn1I=
=sQbt
-----END PGP SIGNATURE-----