Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.13.2015.064.01
Kategorie:Slackware Local Security Checks
Titel:Slackware: Security Advisory (SSA:2015-064-01)
Zusammenfassung:The remote host is missing an update for the 'samba' package(s) announced via the SSA:2015-064-01 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'samba' package(s) announced via the SSA:2015-064-01 advisory.

Vulnerability Insight:
New samba packages are available for Slackware 14.1 and -current to
fix security issues.


Here are the details from the Slackware 14.1 ChangeLog:
+--------------------------+
patches/packages/samba-4.1.17-i486-1_slack14.1.txz: Upgraded.
This package fixes security issues since the last update:
BUG 11077: CVE-2015-0240: talloc free on uninitialized stack pointer
in netlogon server could lead to security vulnerability.
BUG 11077: CVE-2015-0240: s3-netlogon: Make sure we do not deference
a NULL pointer.
For more information, see:
[link moved to references]
(* Security fix *)
+--------------------------+

Affected Software/OS:
'samba' package(s) on Slackware 14.1, Slackware current.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2015-0240
1031783
http://www.securitytracker.com/id/1031783
36741
https://www.exploit-db.com/exploits/36741/
72711
http://www.securityfocus.com/bid/72711
DSA-3171
http://www.debian.org/security/2015/dsa-3171
GLSA-201502-15
http://security.gentoo.org/glsa/glsa-201502-15.xml
HPSBGN03288
http://marc.info/?l=bugtraq&m=142722696102151&w=2
HPSBUX03320
http://marc.info/?l=bugtraq&m=143039217203031&w=2
MDVSA-2015:081
http://www.mandriva.com/security/advisories?name=MDVSA-2015:081
MDVSA-2015:082
http://www.mandriva.com/security/advisories?name=MDVSA-2015:082
RHSA-2015:0249
http://rhn.redhat.com/errata/RHSA-2015-0249.html
RHSA-2015:0250
http://rhn.redhat.com/errata/RHSA-2015-0250.html
RHSA-2015:0251
http://rhn.redhat.com/errata/RHSA-2015-0251.html
RHSA-2015:0252
http://rhn.redhat.com/errata/RHSA-2015-0252.html
RHSA-2015:0253
http://rhn.redhat.com/errata/RHSA-2015-0253.html
RHSA-2015:0254
http://rhn.redhat.com/errata/RHSA-2015-0254.html
RHSA-2015:0255
http://rhn.redhat.com/errata/RHSA-2015-0255.html
RHSA-2015:0256
http://rhn.redhat.com/errata/RHSA-2015-0256.html
RHSA-2015:0257
http://rhn.redhat.com/errata/RHSA-2015-0257.html
SSA:2015-064-01
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.360345
SSRT101952
SSRT101979
SUSE-SU-2015:0353
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html
SUSE-SU-2015:0371
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html
SUSE-SU-2015:0386
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html
USN-2508-1
http://www.ubuntu.com/usn/USN-2508-1
http://advisories.mageia.org/MGASA-2015-0084.html
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
https://access.redhat.com/articles/1346913
https://bugzilla.redhat.com/show_bug.cgi?id=1191325
https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/
https://support.lenovo.com/product_security/samba_remote_vuln
https://support.lenovo.com/us/en/product_security/samba_remote_vuln
https://www.samba.org/samba/security/CVE-2015-0240
openSUSE-SU-2015:0375
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html
openSUSE-SU-2016:1064
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
openSUSE-SU-2016:1106
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
openSUSE-SU-2016:1107
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.