Mandriva Linux Security Advisory : samba4 (MDVSA-2015:083)

This script is Copyright (C) 2015-2016 Tenable Network Security, Inc.


Synopsis :

The remote Mandriva Linux host is missing one or more security
updates.

Description :

Multiple vulnerabilities has been discovered and corrected in samba4 :

Samba 4.0.x before 4.0.24, 4.1.x before 4.1.16, and 4.2.x before
4.2rc4, when an Active Directory Domain Controller (AD DC) is
configured, allows remote authenticated users to set the LDB
userAccountControl UF_SERVER_TRUST_ACCOUNT bit, and consequently gain
privileges, by leveraging delegation of authority for user-account or
computer-account creation (CVE-2014-8143).

An uninitialized pointer use flaw was found in the Samba daemon
(smbd). A malicious Samba client could send specially crafted netlogon
packets that, when processed by smbd, could potentially lead to
arbitrary code execution with the privileges of the user running smbd
(by default, the root user) (CVE-2015-0240).

The updated packages provides a solution for these security issues.

See also :

https://www.samba.org/samba/history/samba-4.1.15.html
https://www.samba.org/samba/history/samba-4.1.16.html
https://www.samba.org/samba/history/samba-4.1.17.html
https://www.samba.org/samba/security/CVE-2014-8143
https://www.samba.org/samba/security/CVE-2015-0240

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: Mandriva Local Security Checks

Nessus Plugin ID: 82336 ()

Bugtraq ID:

CVE ID: CVE-2014-8143
CVE-2015-0240

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now