CVE-2017-14746 Amazon Linux Security Advisory for samba: ALAS-2017-933

漏洞类别:Amazon Linux



Use-after-free in processing SMB1 requests
A use-after-free flaw was found in the way samba servers handled certain SMB1 requests. An unauthenticated attacker could send specially-crafted SMB1 requests to cause the server to crash or execute arbitrary code. (CVE-2017-14746)

Server heap-memory disclosure
A memory disclosure flaw was found in samba. An attacker could retrieve parts of server memory, which could contain potentially sensitive data, by sending specially-crafted requests to the samba server. (CVE-2017-15275 )

QID Detection Logic:
This authenticated QID verifies if the version of the following files is lesser than 4.6.2-12.37.amzn1: libwbclient,samba-winbind-modules,samba-krb5-printing,samba-devel,ctdb,samba-test-libs,samba-client,samba-debuginfo,samba-libs,samba-common-tools,samba-winbind,samba-python,samba-winbind-krb5-locator,samba-common-libs,ctdb-tests,libsmbclient,libwbclient-devel,libsmbclient-devel,samba-client-libs,samba-test,samba,samba-winbind-clients,samba-common,samba-pidl


Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.


Please refer to Amazon advisory ALAS-2017-933 for affected packages and patching details, or update with your package manager.

Following are links for downloading patches to fix the vulnerabilities:

ALAS-2017-933: Amazon Linux (samba (4.6.2-12.37.amzn1) on noarch)

ALAS-2017-933: Amazon Linux (samba (4.6.2-12.37.amzn1) on x86_64)

ALAS-2017-933: Amazon Linux (samba (4.6.2-12.37.amzn1) on src)

ALAS-2017-933: Amazon Linux (samba (4.6.2-12.37.amzn1) on i686)

Leave a Reply