Oracle Linux 7 : samba (ELSA-2017-1950)

High Nessus Plugin ID 102290


The remote Oracle Linux host is missing one or more security updates.


From Red Hat Security Advisory 2017:1950 :

An update for samba is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Low. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link (s) in the References section.

Samba is an open source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.

The following packages have been upgraded to a later upstream version:
samba (4.6.2). (BZ#1391954)

Security Fix(es) :

* A flaw was found in the way Samba handled dangling symlinks. An authenticated malicious Samba client could use this flaw to cause the smbd daemon to enter an infinite loop and use an excessive amount of CPU and memory. (CVE-2017-9461)

Additional Changes :

For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.4 Release Notes linked from the References section.


Update the affected samba packages.

See Also

Plugin Details

Severity: High

ID: 102290

File Name: oraclelinux_ELSA-2017-1950.nasl

Version: $Revision: 3.3 $

Type: local

Agent: unix

Published: 2017/08/09

Modified: 2018/02/01

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.8

Temporal Score: 6.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:ND


Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:X

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:libsmbclient, p-cpe:/a:oracle:linux:libsmbclient-devel, p-cpe:/a:oracle:linux:libwbclient, p-cpe:/a:oracle:linux:libwbclient-devel, p-cpe:/a:oracle:linux:samba, p-cpe:/a:oracle:linux:samba-client, p-cpe:/a:oracle:linux:samba-client-libs, p-cpe:/a:oracle:linux:samba-common, p-cpe:/a:oracle:linux:samba-common-libs, p-cpe:/a:oracle:linux:samba-common-tools, p-cpe:/a:oracle:linux:samba-dc, p-cpe:/a:oracle:linux:samba-dc-libs, p-cpe:/a:oracle:linux:samba-devel, p-cpe:/a:oracle:linux:samba-krb5-printing, p-cpe:/a:oracle:linux:samba-libs, p-cpe:/a:oracle:linux:samba-pidl, p-cpe:/a:oracle:linux:samba-python, p-cpe:/a:oracle:linux:samba-test, p-cpe:/a:oracle:linux:samba-test-libs, p-cpe:/a:oracle:linux:samba-vfs-glusterfs, p-cpe:/a:oracle:linux:samba-winbind, p-cpe:/a:oracle:linux:samba-winbind-clients, p-cpe:/a:oracle:linux:samba-winbind-krb5-locator, p-cpe:/a:oracle:linux:samba-winbind-modules, cpe:/o:oracle:linux:7

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/08/08

Reference Information

CVE: CVE-2017-9461

OSVDB: 158642

RHSA: 2017:1950