svn commit: r413154 - head/security/vuxml

Timur I. Bakeyev timur at FreeBSD.org
Tue Apr 12 18:49:30 UTC 2016


Author: timur
Date: Tue Apr 12 18:49:29 2016
New Revision: 413154
URL: https://svnweb.freebsd.org/changeset/ports/413154

Log:
  Multiple vulnerabilities in Samba.
  [CVE-2015-5370] Errors in Samba DCE-RPC code can lead to denial of service (crashes and high cpu consumption) and man in the middle attacks.
  [CVE-2016-2110] The feature negotiation of NTLMSSP is not downgrade protected. A man in the middle is able to clear even required flags,
      especially NTLMSSP_NEGOTIATE_SIGN and NTLMSSP_NEGOTIATE_SEAL.
  [CVE-2016-2111] When Samba is configured as Domain Controller it allows remote attackers to spoof the computer name of a secure channel's endpoints,
      and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic.
  [CVE-2016-2112] A man in the middle is able to downgrade LDAP connections to no integrity protection.
  [CVE-2016-2113] Man in the middle attacks are possible for client triggered LDAP connections (with ldaps://) and ncacn_http connections (with https://).
  [CVE-2016-2114] Due to a bug Samba doesn't enforce required smb signing, even if explicitly configured.
  [CVE-2016-2115] The protection of DCERPC communication over ncacn_np (which is the default for most the file server related protocols) is inherited
      from the underlying SMB connection.
  [CVE-2016-2118] a.k.a. BADLOCK. A man in the middle can intercept any DCERPC traffic between a client and a server in order to impersonate the client
      and get the same privileges as the authenticated user account. This is most problematic against active directory domain controllers.
  Security:	CVE-2015-5370
  		CVE-2016-2110
  		CVE-2016-2111
  		CVE-2016-2112
  		CVE-2016-2113
  		CVE-2016-2114
  		CVE-2016-2115
  		CVE-2016-2118
  Sponsored by:	Micro$oft

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Tue Apr 12 18:19:45 2016	(r413153)
+++ head/security/vuxml/vuln.xml	Tue Apr 12 18:49:29 2016	(r413154)
@@ -58,6 +58,85 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="a636fc26-00d9-11e6-b704-000c292e4fd8">
+    <topic>samba -- multiple vulnerabilities</topic>
+    <affects>
+      <package>
+	<name>samba36</name>
+	<range><ge>3.6.0</ge><le>3.6.25_3</le></range>
+      </package>
+      <package>
+	<name>samba4</name>
+	<range><ge>4.0.0</ge><le>4.0.26</le></range>
+      </package>
+      <package>
+	<name>samba41</name>
+	<range><ge>4.1.0</ge><le>4.1.23</le></range>
+      </package>
+      <package>
+	<name>samba42</name>
+	<range><ge>4.2.0</ge><lt>4.2.11</lt></range>
+      </package>
+      <package>
+	<name>samba43</name>
+	<range><ge>4.3.0</ge><lt>4.3.8</lt></range>
+      </package>
+      <package>
+	<name>samba44</name>
+	<range><ge>4.4.0</ge><lt>4.4.2</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Samba team reports:</p>
+	<blockquote cite="https://www.samba.org/samba/latest_news.html#4.4.2">
+	  <p>[CVE-2015-5370] Errors in Samba DCE-RPC code can lead to denial of service
+	   (crashes and high cpu consumption) and man in the middle attacks.</p>
+	  <p>[CVE-2016-2110] The feature negotiation of NTLMSSP is not downgrade protected.
+	   A man in the middle is able to clear even required flags, especially
+	   NTLMSSP_NEGOTIATE_SIGN and NTLMSSP_NEGOTIATE_SEAL.</p>
+	  <p>[CVE-2016-2111] When Samba is configured as Domain Controller it allows remote
+	   attackers to spoof the computer name of a secure channel's endpoints, and obtain
+	   sensitive session information, by running a crafted application and leveraging
+	   the ability to sniff network traffic.</p>
+	  <p>[CVE-2016-2112] A man in the middle is able to downgrade LDAP connections
+	   to no integrity protection.</p>
+	  <p>[CVE-2016-2113] Man in the middle attacks are possible for client triggered LDAP
+	   connections (with ldaps://) and ncacn_http connections (with https://).</p>
+	  <p>[CVE-2016-2114] Due to a bug Samba doesn't enforce required smb signing, even if explicitly configured.</p>
+	  <p>[CVE-2016-2115] The protection of DCERPC communication over ncacn_np (which is
+	   the default for most the file server related protocols) is inherited from the underlying SMB connection.</p>
+	  <p>[CVE-2016-2118] a.k.a. BADLOCK. A man in the middle can intercept any DCERPC traffic
+	   between a client and a server in order to impersonate the client and get the same privileges
+	   as the authenticated user account. This is most problematic against active directory domain controllers.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2015-5370</cvename>
+      <url>https://www.samba.org/samba/security/CVE-2015-5370.html</url>
+      <cvename>CVE-2016-2110</cvename>
+      <url>https://www.samba.org/samba/security/CVE-2016-2110.html</url>
+      <cvename>CVE-2016-2111</cvename>
+      <url>https://www.samba.org/samba/security/CVE-2016-2111.html</url>
+      <cvename>CVE-2016-2112</cvename>
+      <url>https://www.samba.org/samba/security/CVE-2016-2112.html</url>
+      <cvename>CVE-2016-2113</cvename>
+      <url>https://www.samba.org/samba/security/CVE-2016-2113.html</url>
+      <cvename>CVE-2016-2114</cvename>
+      <url>https://www.samba.org/samba/security/CVE-2016-2114.html</url>
+      <cvename>CVE-2016-2115</cvename>
+      <url>https://www.samba.org/samba/security/CVE-2016-2115.html</url>
+      <cvename>CVE-2016-2118</cvename>
+      <url>https://www.samba.org/samba/security/CVE-2016-2118.html</url>
+    </references>
+    <dates>
+      <discovery>2016-04-12</discovery>
+      <entry>2016-04-12</entry>
+      <modified>2016-04-12</modified>
+    </dates>
+  </vuln>
+
   <vuln vid="482d40cb-f9a3-11e5-92ce-002590263bf5">
     <topic>php -- multiple vulnerabilities</topic>
     <affects>


More information about the svn-ports-head mailing list