DSA-3909-1 samba -- security update

Related Vulnerabilities: CVE-2017-11103  

Jeffrey Altman, Viktor Duchovni and Nico Williams identified a mutual authentication bypass vulnerability in samba, the SMB/CIFS file, print, and login server. Also known as Orpheus' Lyre, this vulnerability is located in Samba Kerberos Key Distribution Center (KDC-REP) component and could be used by an attacker on the network path to impersonate a server. More details can be found on the vulnerability website (https://orpheus-lyre.info/) and on the Samba project website ( https://www.samba.org/samba/security/CVE-2017-11103.html) For the oldstable distribution (jessie), this problem has been fixed in version 2:4.2.14+dfsg-0+deb8u7. For the stable distribution (stretch), this problem has been fixed in version 2:4.5.8+dfsg-2+deb9u1. For the testing distribution (buster), this problem has been fixed in version 2:4.6.5+dfsg-4. For the unstable distribution (sid), this problem has been fixed in version 2:4.6.5+dfsg-4. We recommend that you upgrade your samba packages.

Debian Security Advisory

DSA-3909-1 samba -- security update

Date Reported:
14 Jul 2017
Affected Packages:
samba
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 868209.
In Mitre's CVE dictionary: CVE-2017-11103.
More information:

Jeffrey Altman, Viktor Duchovni and Nico Williams identified a mutual authentication bypass vulnerability in samba, the SMB/CIFS file, print, and login server. Also known as Orpheus' Lyre, this vulnerability is located in Samba Kerberos Key Distribution Center (KDC-REP) component and could be used by an attacker on the network path to impersonate a server.

More details can be found on the vulnerability website (https://orpheus-lyre.info/) and on the Samba project website ( https://www.samba.org/samba/security/CVE-2017-11103.html)

For the oldstable distribution (jessie), this problem has been fixed in version 2:4.2.14+dfsg-0+deb8u7.

For the stable distribution (stretch), this problem has been fixed in version 2:4.5.8+dfsg-2+deb9u1.

For the testing distribution (buster), this problem has been fixed in version 2:4.6.5+dfsg-4.

For the unstable distribution (sid), this problem has been fixed in version 2:4.6.5+dfsg-4.

We recommend that you upgrade your samba packages.