exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Ubuntu Security Notice USN-3296-2

Ubuntu Security Notice USN-3296-2
Posted May 26, 2017
Authored by Ubuntu | Site security.ubuntu.com

Ubuntu Security Notice 3296-2 - USN-3296-1 fixed a vulnerability in Samba. This update provides the corresponding update for Ubuntu 12.04 ESM. It was discovered that Samba incorrectly handled shared libraries. A remote attacker could use this flaw to upload a shared library to a writable share and execute arbitrary code. Various other issues were also addressed.

tags | advisory, remote, arbitrary
systems | linux, ubuntu
advisories | CVE-2017-7494
SHA-256 | 582154a3e5f15b8b497e94262789591a1ba008088aa8adf694d1ab35ee200e61

Ubuntu Security Notice USN-3296-2

Change Mirror Download

==========================================================================
Ubuntu Security Notice USN-3296-2
May 24, 2017

samba vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 12.04 ESM

Summary:

Samba could be made to run programs as an administrator.

Software Description:
- samba: SMB/CIFS file, print, and login server for Unix

Details:

USN-3296-1 fixed a vulnerability in Samba. This update provides the
corresponding update for Ubuntu 12.04 ESM.

Original advisory details:

It was discovered that Samba incorrectly handled shared libraries. A remote
attacker could use this flaw to upload a shared library to a writable share
and execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
samba 2:3.6.25-0ubuntu0.12.04.11

In general, a standard system update will make all the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3296-2
https://www.ubuntu.com/usn/usn-3296-1
CVE-2017-7494


--mP3DRpeJDSE+ciuQ

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=lVjy
-----END PGP SIGNATURE-----

--mP3DRpeJDSE+ciuQ--


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close