Les versions de sécurité SAMBA+ 4.18.1, 4.17.7 et 4.16.10 sont disponibles

SAMBA+ 4.18.1, 4.17.7 et 4.16.10 viennent d'être publiés. Il s'agit de versions de sécurité importantes, veuillez mettre à jour les systèmes concernés dès que possible. Les paquets sont disponibles pour diverses plateformes SUSE et Red Hat ainsi que pour Debian GNU/Linux, Ubuntu et AIX.

Les paquets traitent les problèmes de sécurité suivants, qui n'affectent que Samba AD DC et les outils associés.

  • CVE-2023-0614 Access controlled AD LDAP attributes can be discovered.
    The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure via LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC.

    Installations with such secrets in their Samba AD should assume they have been obtained and need replacing.
  • CVE-2023-0225 Samba AD DC "dnsHostname" attribute can be deleted by unprivileged authenticated users.
    An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory.

    Affects only Samba 4.17.0 and later versions.  
  • CVE-2023-0922 Samba AD DC admin tool samba-tool sends passwords in cleartext.
    The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection.
Contact us
Deutsch English Français