1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
2 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
3 <html xmlns="http://www.w3.org/1999/xhtml">
6 <title>Samba - Security Announcement Archive</title>
11 <H2>CVE-2012-6150.html:</H2>
15 ===========================================================
16 == Subject: pam_winbind login without require_membership_of restrictions
18 == CVE ID#: CVE-2012-6150
20 == Versions: Samba 3.3.10, 3.4.3, 3.5.0 and later
22 == Summary: Login of authenticated users is not restricted by the
23 == pam_winbind require_membership_of parameter if it only
24 == specifies invalid group names.
26 ===========================================================
32 Winbind allows for the further restriction of authenticated PAM logins using
33 the require_membership_of parameter. System administrators may specify a list
34 of SIDs or groups for which an authenticated user must be a member of. If an
35 authenticated user does not belong to any of the entries, then login should
36 fail. Invalid group name entries are ignored.
38 Samba versions 3.3.10, 3.4.3, 3.5.0 and later incorrectly allow login from
39 authenticated users if the require_membership_of parameter specifies only
42 This is a vulnerability with low impact. All require_membership_of group
43 names must be invalid for this bug to be encountered.
49 Patches addressing this issue have been posted to:
51 http://www.samba.org/samba/security/
53 Samba versions 3.6.22, 4.0.13, and 4.1.3 have been released to address this
60 Ensure that the require_membership_of parameter only refers to SIDs or valid
61 Active Directory group names.
67 This problem was found by Noel Power from SUSE who also provided the patch
70 ==========================================================
71 == Our Code, Our Bugs, Our Responsibility.
73 ==========================================================