USN-4167-2: Samba vulnerabilities

29 October 2019

samba vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 ESM
  • Ubuntu 12.04 ESM

Summary

Several security issues were fixed in Samba.

Software Description

  • samba - SMB/CIFS file, print, and login server for Unix

Details

USN-4167-1 fixed several vulnerabilities in Samba. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM.

Original advisory details:

Michael Hanselmann discovered that the Samba client code incorrectly handled path separators. If a user were tricked into connecting to a malicious server, a remote attacker could use this issue to cause the client to access local pathnames instead of network pathnames. (CVE-2019-10218)

Adam Xu discovered that Samba incorrectly handled the dirsync LDAP control. A remote attacker with "get changes" permissions could possibly use this issue to cause Samba to crash, resulting in a denial of service. This issue only affected Ubuntu 14.04 ESM. (CVE-2019-14847)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 ESM
libsmbclient - 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm3
samba - 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm3
Ubuntu 12.04 ESM
libsmbclient - 2:3.6.25-0ubuntu0.12.04.19
samba - 2:3.6.25-0ubuntu0.12.04.19

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References