FreeBSD : samba -- multiple vulnerabilities (e4bc323f-cc73-11e6-b704-000c292e4fd8)

This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Samba team reports :

[CVE-2016-2123] Authenticated users can supply malicious dnsRecord
attributes on DNS objects and trigger a controlled memory corruption.

[CVE-2016-2125] Samba client code always requests a forwardable ticket
when using Kerberos authentication. This means the target server,
which must be in the current or trusted domain/realm, is given a valid
general purpose Kerberos 'Ticket Granting Ticket' (TGT), which can be
used to fully impersonate the authenticated user or service.

[CVE-2016-2126] A remote, authenticated, attacker can cause the
winbindd process to crash using a legitimate Kerberos ticket due to
incorrect handling of the PAC checksum. A local service with access to
the winbindd privileged pipe can cause winbindd to cache elevated
access permissions.

See also :

https://www.samba.org/samba/security/CVE-2016-2123.html
https://www.samba.org/samba/security/CVE-2016-2125.html
https://www.samba.org/samba/security/CVE-2016-2126.html
http://www.nessus.org/u?c21320e5

Solution :

Update the affected packages.

Risk factor :

High

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 96164 ()

Bugtraq ID:

CVE ID: CVE-2016-2123
CVE-2016-2125
CVE-2016-2126

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now