Summary: | <net-fs/samba-3.6.24: Uninitialized memory exposure (CVE-2014-{0178,0239}) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | limanski, samba |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://bugzilla.redhat.com/show_bug.cgi?id=1101992 | ||
Whiteboard: | A3 [glsa] | ||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 514676 | ||
Bug Blocks: |
Description
Agostino Sarubbo
2014-05-29 07:59:19 UTC
Samba Reference: http://www.samba.org/samba/security/CVE-2014-0178 Samba 4.1.8 Available for Download ============================= Release Notes for Samba 4.1.8 June 3, 2014 ============================= This is the latest stable release of Samba 4.1. Please note that this bug fix release also addresses two minor security issues without being a dedicated security release: o CVE-2014-0239: dns: Don't reply to replies (bug #10609). o CVE-2014-0178: Malformed FSCTL_SRV_ENUMERATE_SNAPSHOTS response (bug #10549). Please let us know when you are ready for stabilization. CVE-2014-0178 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0178): Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request. I don't see a fix for this upstream for the 3.6 series, specifically it is not mentioned in either http://www.samba.org/samba/history/samba-3.6.24.html nor http://www.samba.org/samba/history/samba-3.6.23.html CVE-2014-0239 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0239): The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103. *** Bug 541182 has been marked as a duplicate of this bug. *** +*samba-4.1.17 (23 Feb 2015) +*samba-4.0.25 (23 Feb 2015) +*samba-3.6.25 (23 Feb 2015) + + 23 Feb 2015; Lars Wendler <polynomial-c@gentoo.org> +samba-3.6.25.ebuild, + -samba-4.0.23.ebuild, -samba-4.0.24.ebuild, +samba-4.0.25.ebuild, + -samba-4.1.15.ebuild, -samba-4.1.16.ebuild, +samba-4.1.17.ebuild: + Security bump (bug #511764). Removed old. + Added to existing GLSA request This issue was resolved and addressed in GLSA 201502-15 at http://security.gentoo.org/glsa/glsa-201502-15.xml by GLSA coordinator Kristian Fiskerstrand (K_F). |