Avis du CERT RENATER

Par défaut, cette page vous affichera les derniers messages envoyés par le CERT RENATER à la communauté. Vous pouvez affiner par année ou par type de message. Si aucun critère n'est précisé, seuls les derniers messages sont affichés
Date : Wed, 31 May 2017 11:53:40 +0200
Type : VULN
Sujet : CERT-Renater : 2017/VULN163 (Cisco : Vulnerability in Samba Affecting Cisco Products May 2017)
===================================================================
                              CERT-Renater

                 Note d'Information No. 2017/VULN163
_____________________________________________________________________

DATE                : 31/05/2017

HARDWARE PLATFORM(S): Cisco.

OPERATING SYSTEM(S):  Cisco OS running Samba.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170530-samba
____________________________________________________________________

Cisco Security Advisory: Vulnerability in Samba Affecting Cisco
Products: May 2017

Advisory ID: cisco-sa-20170530-samba

Revision: 1.0

For Public Release: 2017 May 30 19:30 GMT

Last Updated: 2017 May 30 19:30 GMT

CVE ID(s): CVE-2017-7494

+---------------------------------------------------------------------

Summary
=======
On May 24, 2017, the Samba team disclosed a vulnerability in Samba
server software that could allow an authenticated attacker to execute
arbitrary code remotely on a targeted system.

This vulnerability has been assigned CVE ID CVE-2017-7494

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170530-samba
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170530-samba"]

==========================================================
+ CERT-RENATER          | tel : 01-53-94-20-44           +
+ 23 - 25 Rue Daviel    | fax : 01-53-94-20-41           +
+ 75013 Paris           | email: cert@support.renater.fr +
==========================================================

[An attachment of type application/pkcs7-signature was included here]