Ubuntu 10.04 LTS / 12.04 LTS / 12.10 / 13.04 / 13.10 : samba vulnerabilities (USN-2054-1)

Ubuntu Security Notice (C) 2013-2014 Canonical, Inc. / NASL script (C) 2013-2014 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

It was discovered that Winbind incorrectly handled invalid group names
with the require_membership_of parameter. If an administrator used an
invalid group name by mistake, access was granted instead of having
the login fail. (CVE-2012-6150)

Stefan Metzmacher and Michael Adam discovered that Samba incorrectly
handled DCE-RPC fragment length fields. A remote attacker could use
this issue to cause Samba to crash, resulting in a denial of service,
or possibly execute arbitrary code as the root user. (CVE-2013-4408)

Hemanth Thummala discovered that Samba incorrectly handled file
permissions when vfs_streams_depot or vfs_streams_xattr were enabled.
A remote attacker could use this issue to bypass intended
restrictions. (CVE-2013-4475).

Solution :

Update the affected libpam-winbind, samba and / or winbind packages.

Risk factor :

High / CVSS Base Score : 8.3
CVSS Temporal Score : 7.2
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 71376 ()

Bugtraq ID: 63646

CVE ID: CVE-2012-6150