Use-after-free in processing SMB1 requests
A use-after-free flaw was found in the way samba servers handled certain SMB1 requests. An unauthenticated attacker could send specially-crafted SMB1 requests to cause the server to crash or execute arbitrary code. (CVE-2017-14746)
Server heap-memory disclosure
A memory disclosure flaw was found in samba. An attacker could retrieve parts of server memory, which could contain potentially sensitive data, by sending specially-crafted requests to the samba server. (CVE-2017-15275 )
QID Detection Logic:
This authenticated QID verifies if the version of the following files is lesser than 4.6.2-12.37.amzn1: libwbclient,samba-winbind-modules,samba-krb5-printing,samba-devel,ctdb,samba-test-libs,samba-client,samba-debuginfo,samba-libs,samba-common-tools,samba-winbind,samba-python,samba-winbind-krb5-locator,samba-common-libs,ctdb-tests,libsmbclient,libwbclient-devel,libsmbclient-devel,samba-client-libs,samba-test,samba,samba-winbind-clients,samba-common,samba-pidl
Allows unauthorized disclosure of information; allows unauthorized modification; allows disruption of service.
Please refer to Amazon advisory ALAS-2017-933 for affected packages and patching details, or update with your package manager.
Following are links for downloading patches to fix the vulnerabilities: