Ubuntu 10.04 LTS / 12.04 LTS / 13.10 / 14.04 LTS : samba vulnerabilities (USN-2257-1)

Ubuntu Security Notice (C) 2014-2016 Canonical, Inc. / NASL script (C) 2014-2016 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing a security-related patch.

Description :

Christof Schmitt discovered that Samba incorrectly initialized a
certain response field when vfs shadow copy was enabled. A remote
authenticated attacker could use this issue to possibly obtain
sensitive information. This issue only affected Ubuntu 13.10 and
Ubuntu 14.04 LTS. (CVE-2014-0178)

It was discovered that the Samba internal DNS server incorrectly
handled QR fields when processing incoming DNS messages. A remote
attacker could use this issue to cause Samba to consume resources,
resulting in a denial of service. This issue only affected Ubuntu
14.04 LTS. (CVE-2014-0239)

Daniel Berteaud discovered that the Samba NetBIOS name service daemon
incorrectly handled certain malformed packets. A remote attacker could
use this issue to cause Samba to consume resources, resulting in a
denial of service. This issue only affected Ubuntu 12.04 LTS, Ubuntu
13.10, and Ubuntu 14.04 LTS. (CVE-2014-0244)

Simon Arlott discovered that Samba incorrectly handled certain unicode
path names. A remote authenticated attacker could use this issue to
cause Samba to stop responding, resulting in a denial of service.
(CVE-2014-3493).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected samba package.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 76275 ()

Bugtraq ID: 67686
67691
68148
68150

CVE ID: CVE-2014-0178
CVE-2014-0239
CVE-2014-0244
CVE-2014-3493