[USN-3738-1] Samba vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============7850948602140494377==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”drClXobWDHjldLUWA8rwXMbnLu1qBjpl6″

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–drClXobWDHjldLUWA8rwXMbnLu1qBjpl6
Content-Type: multipart/mixed; boundary=”odrjrPxdPynf7XZHrvbSLT6yESwEzyXpc”;
protected-headers=”v1″
From: Marc Deslauriers
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3738-1] Samba vulnerabilities

–odrjrPxdPynf7XZHrvbSLT6yESwEzyXpc
Content-Type: text/plain; charset=utf-8
Content-Language: en-CA
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3738-1
August 14, 2018

samba vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Samba.

Software Description:
– samba: SMB/CIFS file, print, and login server for Unix

Details:

Svyatoslav Phirsov discovered that the Samba libsmbclient library
incorrectly handled extra long filenames. A malicious server could use th=
is
issue to cause Samba to crash, resulting in a denial of service, or
possibly execute arbitrary code. (CVE-2018-10858)

Volker Mauel discovered that Samba incorrectly handled database output.
When used as an Active Directory Domain Controller, a remote authenticate=
d
attacker could use this issue to cause Samba to crash, resulting in a
denial of service. This issue only affected Ubuntu 18.04 LTS.
(CVE-2018-10918)

Phillip Kuhrt discovered that the Samba LDAP server incorrectly handled
certain confidential attribute values. A remote authenticated attacker
could possibly use this issue to obtain certain sensitive information.
(CVE-2018-10919)

Vivek Das discovered that Samba incorrectly handled NTLMv1 being explicit=
ly
disabled on the server. A remote user could possibly be authenticated usi=
ng
NTLMv1, contrary to expectations. This issue only affected Ubuntu 18.04
LTS. (CVE-2018-1139)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
libsmbclient 2:4.7.6+dfsg~ubuntu-0ubuntu2.2
samba 2:4.7.6+dfsg~ubuntu-0ubuntu2.2

Ubuntu 16.04 LTS:
libsmbclient 2:4.3.11+dfsg-0ubuntu0.16.04.15
samba 2:4.3.11+dfsg-0ubuntu0.16.04.15

Ubuntu 14.04 LTS:
libsmbclient 2:4.3.11+dfsg-0ubuntu0.14.04.16
samba 2:4.3.11+dfsg-0ubuntu0.14.04.16

In general, a standard system update will make all the necessary changes.=

References:
https://usn.ubuntu.com/usn/usn-3738-1
CVE-2018-10858, CVE-2018-10918, CVE-2018-10919, CVE-2018-1139

Package Information:
https://launchpad.net/ubuntu/+source/samba/2:4.7.6+dfsg~ubuntu-0ubuntu2=
=2E2
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.16.04=
=2E15
https://launchpad.net/ubuntu/+source/samba/2:4.3.11+dfsg-0ubuntu0.14.04=
=2E16

–odrjrPxdPynf7XZHrvbSLT6yESwEzyXpc–

–drClXobWDHjldLUWA8rwXMbnLu1qBjpl6
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQIzBAEBCgAdFiEEUMSg3c8x5FLOsZtRZWnYVadEvpMFAltzFdMACgkQZWnYVadE
vpOUuw//TPOgtyKTGxpu9s4rUYXuvCF2M4hk5crZZRKZB5n9YXUVYwzCklYi7K80
52c0V0i2zXDjzEyM1/fPFsG5tacWONrBX2DiEKKCbnJE7pEIty+dxDBvJmegwlh/
pSfbe6YXgT9dzIbDRMW77ilbNFlmD62rjjO40HE8BvWK9YAZz6/iBCk70/0RbeQA
dUvCfqhv5iZ4T/KdzzL016Fptodhv31mF/T77lr1OPKPB+yMnPluZXR/xmR55dC1
z0d32Hps7vARm4pC3Su+Ty1YfKiRTGCZhHNZFu4KV8ORKUmcqVYpxOYnE7lpRZqI
sicatKpu7uCzmuBOXQZNrdkUWcoBDtpp0SLDYNW5fbYRdEzEXB2Uo+oX+7s08FOg
VnzGc9d6yISazcXwErAYJ2o44vLrXwytG+Iva0/LA9aqzckfUkrlFRZdku0xVhMK
U8rElIEmDBQIfpuS6gJDXS0h7m1OFj7I2E4zU3tZi+heYXMEU8b8vu3HZ/x8+6Fd
zqEPH/H/nN8Qb1D/+pTHoaDRZHUTsNVOD5GK5nmQjfvaDVUvNTtHenfPsjemfV7O
FPasBhkbaQvIldlP1683x2Cbuzkt/zhXuoysHytgnP0ayNf5glY6o9GGe63UtbSG
4K7cqS7EZlI2mfhfuOKLdUWFlK42La5yYc4FQwGkI9FsWJOaeBg=
=Nruj
—–END PGP SIGNATURE—–

–drClXobWDHjldLUWA8rwXMbnLu1qBjpl6–

–===============7850948602140494377==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============7850948602140494377==–