Displaying 20 results from an estimated 60 matches for "7494".
Did you mean:
74,4
2017 May 25
2
CVE-2017-7494 in SAMBA-AD 4.3.11-ubuntu
Hi
We have the one server SAMBA 4.3.11-ubuntu in Active Directory mode with
some Windows Clients
The Ubuntu repository not update samba package (last version is 4.3.11).
Please, how am i can fix the CVE-2017-7494 (Remote code execution from a
writable share) in my SAMBA server?
Should option 'nt pipe support = no' will influence how SAMBA_AD works?
Anderson Hoffmann
2017 Jun 06
2
CVE-2017-7494 patches
Hi All,
Can someone please confirm if Samba 3.0.28 is vulnerable to CVE-2017-7494. If yes, please let me know where I can get the patches for this.
I have already checked samba site for patches but couldn't find any.
Regards,
Krishna
This message and any attachments are intended only for the use of the addressee and may contain information that is privileged and confiden...
2017 May 26
3
Fix for the CVE-2017-7494?
Hi,
Does a fix has already been made in the CenOS RPM repositories for this
Samba remote execution code vulnerability, CVE-2017-7494?
Thx,
Bernard
2017 May 26
2
Fix for the CVE-2017-7494?
On Fri, 26 May 2017, Christian, Mark wrote:
> On Fri, 2017-05-26 at 11:19 -0400, Bernard Fay wrote:
>> Hi,
>>
>> Does a fix has already been made in the CenOS RPM repositories for this
>> Samba remote execution code vulnerability, CVE-2017-7494?
> yes. samba-3.6.23-43.el6_9.x86_64.rpm
And samba-*-4.4.4-14.el7_3.x86_64
--
Paul Heinlein <> heinlein at madboa.com <> http://www.madboa.com/
2017 May 25
0
CVE-2017-7494 in SAMBA-AD 4.3.11-ubuntu
...elogs/pool/main/s/samba/samba_4.3.11+dfsg-0ubuntu0.16.04.7/changelog)
this fix has been backported into the Ubuntu 4.3.11 packages.
samba (2:4.3.11+dfsg-0ubuntu0.16.04.7) xenial-security; urgency=medium
* SECURITY UPDATE: remote code execution from a writable share
- debian/patches/CVE-2017-7494.patch: refuse to open pipe names with a
slash inside in source3/rpc_server/srv_pipe.c.
- CVE-2017-7494
-- Marc Deslauriers <marc.deslauriers at ubuntu.com> Fri, 19 May 2017
14:18:13 -0400
Mike E.
On Thu, May 25, 2017 at 12:54 PM, Anderson Hoffmann do Carmo via samba <
samba...
2017 Jun 06
4
CVE-2017-7494 patches
Hi Rowland,
Thanks for the update.
The setup we have is unaltered from long time. Now we are asked to install the patch for CVE-2017-7494, since we are not running the affected version its fine for now.
But can you please let me know what are vulnerabilities in 3.0.28 and any patches available for it. I will try to update it to the latest version on our dev servers first.
Moreover we have the below version running, not sure if we s...
2017 May 26
2
Severity of unpublished CVE-2017-2619 and CVE-2017-7494
Hi Team,
Please let me know the severity of CVE-2017-2619 and CVE-2017-7494.
Arjit Kumar
2017 May 26
0
Severity of unpublished CVE-2017-2619 and CVE-2017-7494
On Fri, 2017-05-26 at 11:36 +0530, Arjit Gupta via samba wrote:
> Hi Team,
>
> Please let me know the severity of CVE-2017-2619 and CVE-2017-7494.
They are not unpublished:
https://www.samba.org/samba/security/CVE-2017-2619.html
https://www.samba.org/samba/security/CVE-2017-7494.html
For this second bug, I did some work on CVSS scores:
I've had a go at a CVSSv3 score for the normal case here (password
required to
write to shares):...
2017 May 24
3
[Announce] Samba 4.6.4, 4.5.10 and 4.4.14 Available for Download
Release Announcements
---------------------
These are a security releases in order to address the following defect:
o CVE-2017-7494 (Remote code execution from a writable share)
=======
Details
=======
o CVE-2017-7494:
All versions of Samba from 3.5.0 onwards are vulnerable to a remote
code execution vulnerability, allowing a malicious client to upload a
shared library to a writable share, and then cause the server...
2017 May 24
3
[Announce] Samba 4.6.4, 4.5.10 and 4.4.14 Available for Download
Release Announcements
---------------------
These are a security releases in order to address the following defect:
o CVE-2017-7494 (Remote code execution from a writable share)
=======
Details
=======
o CVE-2017-7494:
All versions of Samba from 3.5.0 onwards are vulnerable to a remote
code execution vulnerability, allowing a malicious client to upload a
shared library to a writable share, and then cause the server...
2017 May 26
0
Fix for the CVE-2017-7494?
On Fri, 2017-05-26 at 11:19 -0400, Bernard Fay wrote:
> Hi,
>
> Does a fix has already been made in the CenOS RPM repositories for this
> Samba remote execution code vulnerability, CVE-2017-7494?
yes. samba-3.6.23-43.el6_9.x86_64.rpm
>
> Thx,
> Bernard
> _______________________________________________
> CentOS mailing list
> CentOS at centos.org
> https://lists.centos.org/mailman/listinfo/centos
2017 May 26
0
Fix for the CVE-2017-7494?
...t; On Fri, 26 May 2017, Christian, Mark wrote:
>
> On Fri, 2017-05-26 at 11:19 -0400, Bernard Fay wrote:
>>
>>> Hi,
>>>
>>> Does a fix has already been made in the CenOS RPM repositories for this
>>> Samba remote execution code vulnerability, CVE-2017-7494?
>>>
>> yes. samba-3.6.23-43.el6_9.x86_64.rpm
>>
>
> And samba-*-4.4.4-14.el7_3.x86_64
>
> --
> Paul Heinlein <> heinlein at madboa.com <> http://www.madboa.com/
>
> _______________________________________________
> CentOS mailing list
> C...
2017 May 26
2
Severity of unpublished CVE-2017-2619 and CVE-2017-7494
...SSv3 score for first bug.
Arjit Kumar
On Fri, May 26, 2017 at 12:29 PM, Andrew Bartlett <abartlet at samba.org>
wrote:
> On Fri, 2017-05-26 at 11:36 +0530, Arjit Gupta via samba wrote:
> > Hi Team,
> >
> > Please let me know the severity of CVE-2017-2619 and CVE-2017-7494.
>
> They are not unpublished:
>
> https://www.samba.org/samba/security/CVE-2017-2619.html
>
> https://www.samba.org/samba/security/CVE-2017-7494.html
>
> For this second bug, I did some work on CVSS scores:
>
> I've had a go at a CVSSv3 score for the normal case h...
2005 Feb 17
2
Sangoma A104 - D-Channel problem
...1
Primary D-channel: 16
Status: Provisioned, Down, Active
Switchtype: EuroISDN
Type: CPE
Window Length: 0/7
Sentrej: 0
SolicitFbit: 0
Retrans: 0
Busy: 0
Overlap Dial: 0
T200 Timer: 1000
T203 Timer: 10000
T305 Timer: 30000
T308 Timer: 4000
T313 Timer: 4000
N200 Counter: 3
NOTICE[16509]: chan_zap.c:7494 pri_dchannel: PRI got event: HDLC Abort (6) on Primary D-channel of span 1
NOTICE[16509]: chan_zap.c:7494 pri_dchannel: PRI got event: HDLC Abort (6) on Primary D-channel of span 1
NOTICE[16509]: chan_zap.c:7494 pri_dchannel: PRI got event: HDLC Abort (6) on Primary D-channel of span 1
NOTICE[16509...
2017 May 26
1
noexec as CVE-2017-7494 mitigation
Am 24.05.2017 um 17:50 schrieb Jeremy Allison via samba:
> Here are some mitigation techniques from Red Hat in
> case servers cannot be patched immediately:
> 2. Mount the filessytem which is used by samba for its writeable share,
> using "noexec" option.
I would have expected this to be standard security precaution on all
pure file servers (which is probably the most
2017 Jun 29
3
Patch application doubt
Hi,
Sorry, but I have the following doubt:
Is need apply the CVE-2017-7494 (Remote code execution from a writable
share) patch or this patch already was included in Debian repository, this
way I need only to execute apt-get upgrade?
In the case that I need to apply manually, how do I do it ?
I'm using Samba 4.6.3 on Debian 8.
Regards,
Márcio Bacci
2017 Jun 29
3
Doubt about patch
Hi,
How I apply CVE-2017-7494 in the Samba 4.6.3 ?
Do I need to recompile and reinstall the Samba 4, after applying this patch?
Regards,
Márcio Bacci
2011 Dec 31
1
Histogram omitting/collapsing groups
...stinfo <- hist(crashes$hour, right=FALSE)
Here's histinfo:
> histinfo
$breaks
?[1] ?0 ?1 ?2 ?3 ?4 ?5 ?6 ?7 ?8 ?9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
$counts
?[1] ?4755 ?4618 ?5959 ?3292 ?2378 ?2715 ?4592 ?6144 ?6860 ?5598 ?5601
?6596 ?7152 ?7490 ?8166
[16] ?9758 11301 11745 ?9943 ?7494 ?6272 ?6220 11669
$intensities
?[1] 0.03041876 0.02954234 0.03812101 0.02105963 0.01521258 0.01736844
0.02937602 0.03930449
?[9] 0.04388490 0.03581161 0.03583081 0.04219604 0.04575289 0.04791515
0.05223967 0.06242403
[17] 0.07229494 0.07513530 0.06360752 0.04794074 0.04012334 0.03979068
0.07464911...
2004 Mar 12
0
Meaning of "smbstatus" display
...hpfrb34402xp (10.233.9.119)
7490 fzs35l pced hpfrb34402y1 (130.171.212.100)
9217 jt users buengeler (10.233.8.201)
7569 fz63vj pced hpfrb34402x1 (130.171.212.96)
27077 zzvvq4 pced hpfrb34402x9 (10.233.12.222)
7494 fzs35l pced hpfrb34402y1 (130.171.212.100)
8017 pzbxg0 pced hpfrb34402xz (10.233.8.26)
8266 vzh860 pced hpfrb34402xf (10.233.10.124)
8151 dz8p74 pced hpfrb34402yg (204.104.206.207)
7956 fzjgcm pced hpfrb34...
2017 May 24
0
[Announce] Samba 4.6.4, 4.5.10 and 4.4.14 Available for Download
On Wed, May 24, 2017 at 09:21:14AM +0200, Karolin Seeger via samba-technical wrote:
> Release Announcements
> ---------------------
>
> These are a security releases in order to address the following defect:
>
> o CVE-2017-7494 (Remote code execution from a writable share)
>
> =======
> Details
> =======
>
> o CVE-2017-7494:
> All versions of Samba from 3.5.0 onwards are vulnerable to a remote
> code execution vulnerability, allowing a malicious client to upload a
> shared library to...