{"id":"USN-2855-2","summary":"samba regression","details":"USN-2855-1 fixed vulnerabilities in Samba. The upstream fix for\nCVE-2015-5252 introduced a regression in certain specific environments.\nThis update fixes the problem.\n\nOriginal advisory details:\n\n Thilo Uttendorfer discovered that the Samba LDAP server incorrectly handled\n certain packets. A remote attacker could use this issue to cause the LDAP\n server to stop responding, resulting in a denial of service. This issue\n only affected Ubuntu 14.04 LTS, Ubuntu 15.04 and Ubuntu 15.10.\n (CVE-2015-3223)\n \n Jan Kasprzak discovered that Samba incorrectly handled certain symlinks. A\n remote attacker could use this issue to access files outside the exported\n share path. (CVE-2015-5252)\n \n Stefan Metzmacher discovered that Samba did not enforce signing when\n creating encrypted connections. If a remote attacker were able to perform a\n machine-in-the-middle attack, this flaw could be exploited to view sensitive\n information. (CVE-2015-5296)\n \n It was discovered that Samba incorrectly performed access control when\n using the VFS shadow_copy2 module. A remote attacker could use this issue\n to access snapshots, contrary to intended permissions. (CVE-2015-5299)\n \n Douglas Bagnall discovered that Samba incorrectly handled certain string\n lengths. A remote attacker could use this issue to possibly access\n sensitive information. (CVE-2015-5330)\n \n It was discovered that the Samba LDAP server incorrectly handled certain\n packets. A remote attacker could use this issue to cause the LDAP server to\n stop responding, resulting in a denial of service. This issue only affected\n Ubuntu 14.04 LTS, Ubuntu 15.04 and Ubuntu 15.10. (CVE-2015-7540)\n \n Andrew Bartlett discovered that Samba incorrectly checked administrative\n privileges during creation of machine accounts. A remote attacker could\n possibly use this issue to bypass intended access restrictions in certain\n environments. This issue only affected Ubuntu 14.04 LTS, Ubuntu 15.04 and\n Ubuntu 15.10. (CVE-2015-8467)\n","modified":"2026-02-10T04:40:56Z","published":"2016-02-16T13:19:54Z","related":["UBUNTU-CVE-2015-5252"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-2855-2"},{"type":"REPORT","url":"https://launchpad.net/bugs/1545750"}],"affected":[{"package":{"name":"samba","ecosystem":"Ubuntu:14.04:LTS","purl":"pkg:deb/ubuntu/samba@2:4.1.6+dfsg-1ubuntu2.14.04.12?arch=source&distro=trusty"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:4.1.6+dfsg-1ubuntu2.14.04.12"}]}],"versions":["2:3.6.18-1ubuntu3","2:4.0.10+dfsg-4ubuntu2","2:4.0.13+dfsg-1ubuntu1","2:4.1.3+dfsg-2ubuntu2","2:4.1.3+dfsg-2ubuntu3","2:4.1.3+dfsg-2ubuntu4","2:4.1.3+dfsg-2ubuntu5","2:4.1.6+dfsg-1ubuntu1","2:4.1.6+dfsg-1ubuntu2","2:4.1.6+dfsg-1ubuntu2.14.04.1","2:4.1.6+dfsg-1ubuntu2.14.04.2","2:4.1.6+dfsg-1ubuntu2.14.04.3","2:4.1.6+dfsg-1ubuntu2.14.04.4","2:4.1.6+dfsg-1ubuntu2.14.04.5","2:4.1.6+dfsg-1ubuntu2.14.04.7","2:4.1.6+dfsg-1ubuntu2.14.04.8","2:4.1.6+dfsg-1ubuntu2.14.04.9","2:4.1.6+dfsg-1ubuntu2.14.04.11"],"ecosystem_specific":{"binaries":[{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"libnss-winbind"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"libpam-smbpass"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"libpam-winbind"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"libparse-pidl-perl"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"libsmbclient"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"libsmbclient-dev"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"libsmbsharemodes-dev"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"libsmbsharemodes0"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"libwbclient-dev"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"libwbclient0"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"python-samba"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"registry-tools"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"samba"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"samba-common"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"samba-common-bin"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"samba-dev"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"samba-dsdb-modules"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"samba-libs"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"samba-testsuite"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"samba-vfs-modules"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"smbclient"},{"binary_version":"2:4.1.6+dfsg-1ubuntu2.14.04.12","binary_name":"winbind"}],"availability":"No subscription required"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2855-2.json","cves_map":{"ecosystem":"Ubuntu:14.04:LTS","cves":[]}}}],"schema_version":"1.7.3"}