First published: Wed Sep 13 2017(Updated: )
An information leak flaw was found in the way SMB1 protocol was implemented by Samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | <4.4.16 | |
Samba Samba | >=4.5.0<4.5.14 | |
Samba Samba | >=4.6.0<4.6.8 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 | |
Redhat Gluster Storage | =3.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/samba | 2:4.9.5+dfsg-5+deb10u3 2:4.9.5+dfsg-5+deb10u4 2:4.13.13+dfsg-1~deb11u5 2:4.17.11+dfsg-0+deb12u1 2:4.17.12+dfsg-0+deb12u1 2:4.19.1+dfsg-4 2:4.19.2+dfsg-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.