Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.67642
Kategorie:Slackware Local Security Checks
Titel:Slackware: Security Advisory (SSA:2010-169-01)
Zusammenfassung:The remote host is missing an update for the 'samba' package(s) announced via the SSA:2010-169-01 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'samba' package(s) announced via the SSA:2010-169-01 advisory.

Vulnerability Insight:
New samba packages are available for Slackware 10.0, 10.1, 10.2, 11.0, 12.0,
12.1, 12.2, and 13.0 to fix a security issue.


Here are the details from the Slackware 13.0 ChangeLog:
+--------------------------+
patches/packages/samba-3.2.15-i486-2_slack13.0.txz: Rebuilt.
Patched a buffer overflow in smbd that allows remote attackers to cause
a denial of service (memory corruption and daemon crash) or possibly
execute arbitrary code via a crafted field in a packet.
For more information, see:
[link moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'samba' package(s) on Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0, Slackware 12.0, Slackware 12.1, Slackware 12.2, Slackware 13.0.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2010-2063
1024107
http://www.securitytracker.com/id?1024107
20100616 Samba 3.3.12 Memory Corruption Vulnerability
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=873
40145
http://secunia.com/advisories/40145
40210
http://secunia.com/advisories/40210
40221
http://secunia.com/advisories/40221
40293
http://secunia.com/advisories/40293
40884
http://www.securityfocus.com/bid/40884
42319
http://secunia.com/advisories/42319
65518
http://osvdb.org/65518
ADV-2010-1486
http://www.vupen.com/english/advisories/2010/1486
ADV-2010-1504
http://www.vupen.com/english/advisories/2010/1504
ADV-2010-1505
http://www.vupen.com/english/advisories/2010/1505
ADV-2010-1507
http://www.vupen.com/english/advisories/2010/1507
ADV-2010-1517
http://www.vupen.com/english/advisories/2010/1517
ADV-2010-3063
http://www.vupen.com/english/advisories/2010/3063
APPLE-SA-2010-08-24-1
http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html
DSA-2061
http://www.debian.org/security/2010/dsa-2061
HPSBUX02609
http://marc.info/?l=bugtraq&m=129138831608422&w=2
HPSBUX02657
http://marc.info/?l=bugtraq&m=130835366526620&w=2
MDVSA-2010:119
http://www.mandriva.com/security/advisories?name=MDVSA-2010:119
RHSA-2010:0488
http://www.redhat.com/support/errata/RHSA-2010-0488.html
SSA:2010-169-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.471914
SSRT100147
SSRT100460
SUSE-SR:2010:014
http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
USN-951-1
http://ubuntu.com/usn/usn-951-1
[samba-announce] 20100616 Samba 3.3.13 Security Release Available for Download
http://marc.info/?l=samba-announce&m=127668712312761&w=2
http://support.apple.com/kb/HT4312
http://www.samba.org/samba/ftp/history/samba-3.3.13.html
http://www.samba.org/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch
http://www.samba.org/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch
http://www.samba.org/samba/security/CVE-2010-2063.html
oval:org.mitre.oval:def:12427
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12427
oval:org.mitre.oval:def:7115
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7115
oval:org.mitre.oval:def:9859
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859
samba-smb1-code-execution(59481)
https://exchange.xforce.ibmcloud.com/vulnerabilities/59481
CopyrightCopyright (C) 2012 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.