Scientific Linux Security Update : samba on SL7.x x86_64

High Nessus Plugin ID 103411


The remote Scientific Linux host is missing one or more security updates.


Security Fix(es) :

- It was found that samba did not enforce 'SMB signing' when certain configuration options were enabled. A remote attacker could launch a man- in-the-middle attack and retrieve information in plain-text. (CVE-2017-12150)

- A flaw was found in the way samba client used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack. (CVE-2017-12151)

- An information leak flaw was found in the way SMB1 protocol was implemented by Samba. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker. (CVE-2017-12163)


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 103411

File Name: sl_20170921_samba_on_SL7_x.nasl

Version: $Revision: 3.3 $

Type: local

Agent: unix

Published: 2017/09/22

Modified: 2017/11/30

Dependencies: 12634

Risk Information

Risk Factor: High

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2017/09/21

Reference Information

CVE: CVE-2017-12150, CVE-2017-12151, CVE-2017-12163