Source: samba Version: 2:4.12.5+dfsg-3 Severity: grave Tags: security upstream fixed-upstream Justification: user security hole Forwarded: https://bugzilla.samba.org/show_bug.cgi?id=14497 X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org> Control: found -1 2:4.9.5+dfsg-5+deb10u1 Control: found -1 2:4.9.5+dfsg-5 Control: found -1 2:4.5.16+dfsg-1+deb9u2 Control: found -1 2:4.5.16+dfsg-1
Hi, The following vulnerability was published for samba. CVE-2020-1472[0]: | An elevation of privilege vulnerability exists when an attacker | establishes a vulnerable Netlogon secure channel connection to a | domain controller, using the Netlogon Remote Protocol (MS-NRPC), aka | 'Netlogon Elevation of Privilege Vulnerability'. I realize that setting the RC severity might be disputed, given by default since 4.8 versions are not 'vulnerable' unless admins have switched to 'server schannel = no' or 'server schannel = auto' from the default. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-1472 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1472 [1] https://bugzilla.samba.org/show_bug.cgi?id=14497 [2] https://www.openwall.com/lists/oss-security/2020/09/17/2 [3] https://www.samba.org/samba/security/CVE-2020-1472.html Regards, Salvatore