漏洞类别:Amazon Linux
漏洞等级:
漏洞信息
Use-after-free in processing SMB1 requests
A use-after-free flaw was found in the way samba servers handled certain SMB1 requests. An unauthenticated attacker could send specially-crafted SMB1 requests to cause the server to crash or execute arbitrary code. (CVE-2017-14746)
Server heap-memory disclosure
A memory disclosure flaw was found in samba. An attacker could retrieve parts of server memory, which could contain potentially sensitive data, by sending specially-crafted requests to the samba server. (CVE-2017-15275 )
QID Detection Logic:
This authenticated QID verifies if the version of the following files is lesser than 4.6.2-12.37.amzn1: libwbclient,samba-winbind-modules,samba-krb5-printing,samba-devel,ctdb,samba-test-libs,samba-client,samba-debuginfo,samba-libs,samba-common-tools,samba-winbind,samba-python,samba-winbind-krb5-locator,samba-common-libs,ctdb-tests,libsmbclient,libwbclient-devel,libsmbclient-devel,samba-client-libs,samba-test,samba,samba-winbind-clients,samba-common,samba-pidl
漏洞危害
Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
解决方案
Please refer to Amazon advisory ALAS-2017-933 for affected packages and patching details, or update with your package manager.
Patch:
Following are links for downloading patches to fix the vulnerabilities:
ALAS-2017-933: Amazon Linux (samba (4.6.2-12.37.amzn1) on noarch)
ALAS-2017-933: Amazon Linux (samba (4.6.2-12.37.amzn1) on x86_64)
ALAS-2017-933: Amazon Linux (samba (4.6.2-12.37.amzn1) on src)
ALAS-2017-933: Amazon Linux (samba (4.6.2-12.37.amzn1) on i686)
0daybank
文章评论