Уязвимость CVE-2017-12163: Информация

Описание

An information leak flaw was found in the way SMB1 protocol was implemented by Samba before 4.4.16, 4.5.x before 4.5.14, and 4.6.x before 4.6.8. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker.

Важность: HIGH (7,1) Вектор: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Опубликовано: 26 июля 2018 г.
Изменено: 13 февраля 2023 г.
Идентификатор типа ошибки: CWE-200

Исправленные пакеты

Имя пакета
Ветка
Исправлено в версии
Версия в репозитории
Errata ID
№ Задания
Состояние
sambasisyphus4.6.8-alt1.S14.19.6-alt1ALT-PU-2017-2287-1188537Исправлено
sambap104.6.8-alt1.S14.19.6-alt1ALT-PU-2017-2287-1188537Исправлено
sambap94.6.8-alt1.S14.14.10-alt2ALT-PU-2017-2287-1188537Исправлено
sambap84.6.8-alt1.M80P.14.9.18-alt1ALT-PU-2017-2292-1188486Исправлено
sambac10f14.6.8-alt1.S14.16.11-alt2ALT-PU-2017-2287-1188537Исправлено
sambac9f24.6.8-alt1.S14.14.14-alt0.c9.1ALT-PU-2017-2287-1188537Исправлено
sambac74.6.14-alt1.M70C.1.14.6.15-alt1.M70C.1ALT-PU-2018-1440-1202075Исправлено
samba-DCp84.6.8-alt1.M80P.14.9.18-alt1ALT-PU-2017-2293-1188486Исправлено
samba-DCc74.6.14-alt1.M70C.1.14.6.15-alt1.M70C.1ALT-PU-2018-1441-1202075Исправлено

Ссылки на рекомендации, решения и инструменты

Ссылка
Ресурс
https://www.samba.org/samba/security/CVE-2017-12163.html
  • Patch
  • Vendor Advisory
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12163
  • Mitigation
  • Issue Tracking
  • Third Party Advisory
https://www.synology.com/support/security/Synology_SA_17_57_Samba
  • Mitigation
  • Third Party Advisory
DSA-3983
  • Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_us
  • Third Party Advisory
https://security.netapp.com/advisory/ntap-20170921-0001/
  • Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03775en_us
  • Third Party Advisory
RHSA-2017:2858
  • Third Party Advisory
RHSA-2017:2791
  • Third Party Advisory
RHSA-2017:2790
  • Third Party Advisory
RHSA-2017:2789
  • Third Party Advisory
1039401
  • Third Party Advisory
  • VDB Entry
100925
  • Third Party Advisory
  • VDB Entry
    1. Конфигурация 1

      cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
      Start including
      4.6.0
      End excliding
      4.6.8

      cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
      Start including
      4.5.0
      End excliding
      4.5.14

      cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
      End excliding
      4.4.16

      Конфигурация 2

      cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

      cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

      Конфигурация 3

      cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

      Running on/with:
      cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

      Конфигурация 4

      cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

      cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*