First published: Wed Nov 13 2013(Updated: )
Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | =4.0.0 | |
Samba | =4.0.1 | |
Samba | =4.0.2 | |
Samba | =4.0.3 | |
Samba | =4.0.4 | |
Samba | =4.0.5 | |
Samba | =4.0.6 | |
Samba | =4.0.7 | |
Samba | =4.0.8 | |
Samba | =4.0.9 | |
Samba | =4.0.10 | |
Samba | =4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-4476 has a medium severity due to its potential impact on confidentiality.
To fix CVE-2013-4476, upgrade Samba to version 4.0.11 or 4.1.1 or later.
Samba versions 4.0.0 to 4.0.10 and 4.1.0 are affected by CVE-2013-4476.
The risks of CVE-2013-4476 include local users being able to read sensitive private key files.
Yes, CVE-2013-4476 specifically affects Samba when SSL is used for LDAP or HTTP connections.