[Pkg-samba-maint] Bug#971048: samba: CVE-2020-1472

Salvatore Bonaccorso carnil at debian.org
Sat Sep 26 20:18:43 BST 2020


Source: samba
Version: 2:4.12.5+dfsg-3
Severity: grave
Tags: security upstream fixed-upstream
Justification: user security hole
Forwarded: https://bugzilla.samba.org/show_bug.cgi?id=14497
X-Debbugs-Cc: carnil at debian.org, Debian Security Team <team at security.debian.org>
Control: found -1 2:4.9.5+dfsg-5+deb10u1
Control: found -1 2:4.9.5+dfsg-5
Control: found -1 2:4.5.16+dfsg-1+deb9u2
Control: found -1 2:4.5.16+dfsg-1

Hi,

The following vulnerability was published for samba.

CVE-2020-1472[0]:
| An elevation of privilege vulnerability exists when an attacker
| establishes a vulnerable Netlogon secure channel connection to a
| domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka
| 'Netlogon Elevation of Privilege Vulnerability'.

I realize that setting the RC severity might be disputed, given by
default since 4.8 versions are not 'vulnerable' unless admins have
switched to 'server schannel = no' or 'server schannel = auto' from
the default.

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-1472
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472
[1] https://bugzilla.samba.org/show_bug.cgi?id=14497
[2] https://www.openwall.com/lists/oss-security/2020/09/17/2
[3] https://www.samba.org/samba/security/CVE-2020-1472.html

Regards,
Salvatore



More information about the Pkg-samba-maint mailing list