samba: CVE-2020-1472

Related Vulnerabilities: CVE-2020-1472  

Debian Bug report logs - #971048
samba: CVE-2020-1472

version graph

Reported by: Salvatore Bonaccorso <carnil@debian.org>

Date: Sat, 26 Sep 2020 19:21:02 UTC

Severity: grave

Tags: fixed-upstream, security, upstream

Found in versions samba/2:4.5.16+dfsg-1, samba/2:4.5.16+dfsg-1+deb9u2, samba/2:4.9.5+dfsg-5, samba/2:4.12.5+dfsg-3, samba/2:4.9.5+dfsg-5+deb10u1

Forwarded to https://bugzilla.samba.org/show_bug.cgi?id=14497

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, carnil@debian.org, team@security.debian.org, Debian Samba Maintainers <pkg-samba-maint@lists.alioth.debian.org>:
Bug#971048; Package src:samba. (Sat, 26 Sep 2020 19:21:03 GMT) (full text, mbox, link).


Acknowledgement sent to Salvatore Bonaccorso <carnil@debian.org>:
New Bug report received and forwarded. Copy sent to carnil@debian.org, team@security.debian.org, Debian Samba Maintainers <pkg-samba-maint@lists.alioth.debian.org>. (Sat, 26 Sep 2020 19:21:03 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: Debian Bug Tracking System <submit@bugs.debian.org>
Subject: samba: CVE-2020-1472
Date: Sat, 26 Sep 2020 21:18:43 +0200
Source: samba
Version: 2:4.12.5+dfsg-3
Severity: grave
Tags: security upstream fixed-upstream
Justification: user security hole
Forwarded: https://bugzilla.samba.org/show_bug.cgi?id=14497
X-Debbugs-Cc: carnil@debian.org, Debian Security Team <team@security.debian.org>
Control: found -1 2:4.9.5+dfsg-5+deb10u1
Control: found -1 2:4.9.5+dfsg-5
Control: found -1 2:4.5.16+dfsg-1+deb9u2
Control: found -1 2:4.5.16+dfsg-1

Hi,

The following vulnerability was published for samba.

CVE-2020-1472[0]:
| An elevation of privilege vulnerability exists when an attacker
| establishes a vulnerable Netlogon secure channel connection to a
| domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka
| 'Netlogon Elevation of Privilege Vulnerability'.

I realize that setting the RC severity might be disputed, given by
default since 4.8 versions are not 'vulnerable' unless admins have
switched to 'server schannel = no' or 'server schannel = auto' from
the default.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-1472
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472
[1] https://bugzilla.samba.org/show_bug.cgi?id=14497
[2] https://www.openwall.com/lists/oss-security/2020/09/17/2
[3] https://www.samba.org/samba/security/CVE-2020-1472.html

Regards,
Salvatore



Marked as found in versions samba/2:4.9.5+dfsg-5+deb10u1. Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Sat, 26 Sep 2020 19:21:04 GMT) (full text, mbox, link).


Marked as found in versions samba/2:4.9.5+dfsg-5. Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Sat, 26 Sep 2020 19:21:04 GMT) (full text, mbox, link).


Marked as found in versions samba/2:4.5.16+dfsg-1+deb9u2. Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Sat, 26 Sep 2020 19:21:05 GMT) (full text, mbox, link).


Marked as found in versions samba/2:4.5.16+dfsg-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to submit@bugs.debian.org. (Sat, 26 Sep 2020 19:21:05 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Sun Sep 27 10:24:50 2020; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.