Alert GCSA-22013 - Aggiornamento di sicurezza per Samba server
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
******************************************************************
alert ID: GCSA-22013
data: 02 febbraio 2022
titolo: Aggiornamento di sicurezza per Samba server
******************************************************************
:: Descrizione del problema
Il team di Samba ha rilasciato nuove versioni del server Samba
(SMB/CIFS file, print, and login server for Unix),
con le quali risolvere alcune vulnerabilita' presenti
in varie versioni del software.
Maggiori informazioni sono disponibili alla sezione "Riferimenti".
:: Software interessato
Samba file server versioni precedenti alla 4.15.5
Samba file server versioni precedenti alla 4.14.12
Samba file server versioni precedenti alla 4.13.17
:: Impatto
Esecuzione remota di codice arbitrario (RCE)
Information leak
Security Feature Bypass (SFB)
:: Soluzioni
Applicare le seguenti patch
https://www.samba.org/samba/history/security.html
oppure aggiornare alle ultime versioni
https://www.samba.org/samba/history/samba-4.15.5.html
https://www.samba.org/samba/history/samba-4.14.12.html
https://www.samba.org/samba/history/samba-4.13.17.html
https://www.samba.org/samba/download/
:: Riferimenti
Samba Announcement
https://www.samba.org/samba/security/CVE-2021-44142.html
https://www.samba.org/samba/security/CVE-2021-44141.html
https://www.samba.org/samba/security/CVE-2022-0336.html
CERT Coordination Center
https://kb.cert.org/vuls/id/119678
Red Hat - Security Advisory
https://access.redhat.com/errata/RHSA-2022:0328
https://access.redhat.com/errata/RHSA-2022:0329
https://access.redhat.com/errata/RHSA-2022:0330
https://access.redhat.com/errata/RHSA-2022:0331
https://access.redhat.com/errata/RHSA-2022:0332
Ubuntu Security Notice
https://ubuntu.com/security/notices/USN-5260-1
https://ubuntu.com/security/notices/USN-5260-2
Trend Micro
https://www.trendmicro.com/en_us/research/22/b/the-samba-vulnerability-what-is-cve-2021-44142-and-how-to-fix-it.html
Zero Day Initiative
https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin
Bleeping Computer
https://www.bleepingcomputer.com/news/security/samba-bug-can-let-remote-attackers-execute-code-as-root/
Mitre's CVE ID
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCYfpd6QAKCRDBnEyTZRJg
QrJ1AKDIelTgwxNZFbRWf0VxhSc89z13oACeMEX2I1v6+KhQoJexBlAfLXdQe/k=
=6BUZ
-----END PGP SIGNATURE-----
Hash: SHA1
******************************************************************
alert ID: GCSA-22013
data: 02 febbraio 2022
titolo: Aggiornamento di sicurezza per Samba server
******************************************************************
:: Descrizione del problema
Il team di Samba ha rilasciato nuove versioni del server Samba
(SMB/CIFS file, print, and login server for Unix),
con le quali risolvere alcune vulnerabilita' presenti
in varie versioni del software.
Maggiori informazioni sono disponibili alla sezione "Riferimenti".
:: Software interessato
Samba file server versioni precedenti alla 4.15.5
Samba file server versioni precedenti alla 4.14.12
Samba file server versioni precedenti alla 4.13.17
:: Impatto
Esecuzione remota di codice arbitrario (RCE)
Information leak
Security Feature Bypass (SFB)
:: Soluzioni
Applicare le seguenti patch
https://www.samba.org/samba/history/security.html
oppure aggiornare alle ultime versioni
https://www.samba.org/samba/history/samba-4.15.5.html
https://www.samba.org/samba/history/samba-4.14.12.html
https://www.samba.org/samba/history/samba-4.13.17.html
https://www.samba.org/samba/download/
:: Riferimenti
Samba Announcement
https://www.samba.org/samba/security/CVE-2021-44142.html
https://www.samba.org/samba/security/CVE-2021-44141.html
https://www.samba.org/samba/security/CVE-2022-0336.html
CERT Coordination Center
https://kb.cert.org/vuls/id/119678
Red Hat - Security Advisory
https://access.redhat.com/errata/RHSA-2022:0328
https://access.redhat.com/errata/RHSA-2022:0329
https://access.redhat.com/errata/RHSA-2022:0330
https://access.redhat.com/errata/RHSA-2022:0331
https://access.redhat.com/errata/RHSA-2022:0332
Ubuntu Security Notice
https://ubuntu.com/security/notices/USN-5260-1
https://ubuntu.com/security/notices/USN-5260-2
Trend Micro
https://www.trendmicro.com/en_us/research/22/b/the-samba-vulnerability-what-is-cve-2021-44142-and-how-to-fix-it.html
Zero Day Initiative
https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin
Bleeping Computer
https://www.bleepingcomputer.com/news/security/samba-bug-can-let-remote-attackers-execute-code-as-root/
Mitre's CVE ID
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44141
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0336
GARR CERT Security Alert - subscribe/unsubscribe:
http://www.cert.garr.it/alert/ricevi-gli-alert-di-cert
-----BEGIN PGP SIGNATURE-----
iF0EARECAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCYfpd6QAKCRDBnEyTZRJg
QrJ1AKDIelTgwxNZFbRWf0VxhSc89z13oACeMEX2I1v6+KhQoJexBlAfLXdQe/k=
=6BUZ
-----END PGP SIGNATURE-----