Virtuozzo 7 : ctdb / ctdb-tests / libsmbclient / etc (VZLSA-2017-1265)

high Nessus Plugin ID 101469
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Virtuozzo host is missing a security update.


An update for samba is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Samba is an open source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

Security Fix(es) :

* It was found that Samba always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users. (CVE-2016-2125)

* A flaw was found in the way Samba handled PAC (Privilege Attribute Certificate) checksums. A remote, authenticated attacker could use this flaw to crash the winbindd process. (CVE-2016-2126)

* A race condition was found in samba server. A malicious samba client could use this flaw to access files and directories, in areas of the server file system not exported under the share definitions.

Red Hat would like to thank the Samba project for reporting CVE-2017-2619. Upstream acknowledges Jann Horn (Google) as the original reporter of CVE-2017-2619.

Note that Tenable Network Security has attempted to extract the preceding description block directly from the corresponding Red Hat security advisory. Virtuozzo provides no description for VZLSA advisories. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.


Update the affected ctdb / ctdb-tests / libsmbclient / etc package.

See Also

Plugin Details

Severity: High

ID: 101469

File Name: Virtuozzo_VZLSA-2017-1265.nasl

Version: 1.12

Type: local

Published: 7/13/2017

Updated: 1/4/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: Medium

Base Score: 6

Temporal Score: 4.7

Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P

Temporal Vector: E:POC/RL:OF/RC:C


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:virtuozzo:virtuozzo:ctdb, p-cpe:/a:virtuozzo:virtuozzo:ctdb-tests, p-cpe:/a:virtuozzo:virtuozzo:libsmbclient, p-cpe:/a:virtuozzo:virtuozzo:libsmbclient-devel, p-cpe:/a:virtuozzo:virtuozzo:libwbclient, p-cpe:/a:virtuozzo:virtuozzo:libwbclient-devel, p-cpe:/a:virtuozzo:virtuozzo:samba, p-cpe:/a:virtuozzo:virtuozzo:samba-client, p-cpe:/a:virtuozzo:virtuozzo:samba-client-libs, p-cpe:/a:virtuozzo:virtuozzo:samba-common, p-cpe:/a:virtuozzo:virtuozzo:samba-common-libs, p-cpe:/a:virtuozzo:virtuozzo:samba-common-tools, p-cpe:/a:virtuozzo:virtuozzo:samba-dc, p-cpe:/a:virtuozzo:virtuozzo:samba-dc-libs, p-cpe:/a:virtuozzo:virtuozzo:samba-devel, p-cpe:/a:virtuozzo:virtuozzo:samba-krb5-printing, p-cpe:/a:virtuozzo:virtuozzo:samba-libs, p-cpe:/a:virtuozzo:virtuozzo:samba-pidl, p-cpe:/a:virtuozzo:virtuozzo:samba-python, p-cpe:/a:virtuozzo:virtuozzo:samba-test, p-cpe:/a:virtuozzo:virtuozzo:samba-test-libs, p-cpe:/a:virtuozzo:virtuozzo:samba-vfs-glusterfs, p-cpe:/a:virtuozzo:virtuozzo:samba-winbind, p-cpe:/a:virtuozzo:virtuozzo:samba-winbind-clients, p-cpe:/a:virtuozzo:virtuozzo:samba-winbind-krb5-locator, p-cpe:/a:virtuozzo:virtuozzo:samba-winbind-modules, cpe:/o:virtuozzo:virtuozzo:7

Required KB Items: Host/local_checks_enabled, Host/Virtuozzo/release, Host/Virtuozzo/rpm-list

Patch Publication Date: 5/22/2017

Reference Information

CVE: CVE-2016-2125, CVE-2016-2126, CVE-2017-2619