MGASA-2020-0380

Source
https://advisories.mageia.org/MGASA-2020-0380.html
Import Source
https://advisories.mageia.org/MGASA-2020-0380.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2020-0380
Related
Published
2020-09-30T10:01:40Z
Modified
2020-09-30T09:28:38Z
Summary
Updated samba packages fix security vulnerability
Details

When Samba is used as a domain controller, an unauthenticated attacker on the network can gain administrator access by exploiting a netlogon protocol flaw (CVE-2020-1472).

Note that Samba installations are not vulnerable unless they have the smb.conf lines 'server schannel = no' or 'server schannel = auto'.

References
Credits

Affected packages

Mageia:7 / samba

Package

Name
samba
Purl
pkg:rpm/mageia/samba?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.10.18-1.mga7

Ecosystem specific

{
    "section": "core"
}