![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.1.4.2012.0502.1 |
Category: | SuSE Local Security Checks |
Title: | SUSE: Security Advisory (SUSE-SU-2012:0502-1) |
Summary: | The remote host is missing an update for the 'Samba' package(s) announced via the SUSE-SU-2012:0502-1 advisory. |
Description: | Summary: The remote host is missing an update for the 'Samba' package(s) announced via the SUSE-SU-2012:0502-1 advisory. Vulnerability Insight: The following issues have been fixed in samba: * CVE-2012-1182: PIDL based autogenerated code uses client supplied size values which allows attackers to write beyond the allocated array size * CVE-2012-0870: Ensure AndX offsets are increasing strictly monotonically in pre-3.4 versions * CVE-2012-0817: Fix memory leak in parent smbd on connection Also the following non-security bugs have been fixed: * s3-winbindd: Only use SamLogonEx when we can get unencrypted session keys, (bso#8599). * Correctly handle DENY ACEs when privileges apply, (bso#8797). * s3:smb2_server: fix a logic error, we should sign non guest sessions, (bso8749). * Allow vfs_aio_pthread to build as a static module, (bso#8723). * s3:dbwrap_ctdb: return the number of records in db_ctdb_traverse() for persistent dbs, (#bso8527). * s3: segfault in dom_sid_compare(bso#8567). * Honor SeTakeOwnershiPrivilege when client asks for SEC_STD_WRITE_OWNER, (bso#8768). * s3-winbindd: Close netlogon connection if the status returned by the NetrSamLogonEx call is timeout in the pam_auth_crap path, (bso#8771). * s3-winbindd: set the can_do_validation6 also for trusted domain, (bso#8599). * Fix problem when calculating the share security mask, take priviliges into account for the connecting user, (bso#8784). * Fix crash in dcerpc_lsa_lookup_sids_noalloc() with over 1000 groups, (bso#8807), (bnc#751454). * Add SERVERID_UNIQUE_ID_NOT_TO_VERIFY, (bso#8760), (bnc#741854). * s3-printing: fix crash in printer_list_set_printer(), (bso#8762), (bnc#746825). * s3:winbindd fix a return code check, (bso#8406). * s3: Add rmdir operation to streams_depot, (bso#8733). * s3:smbd:smb2: fix an assignment-instead-of-check bug conn_snum_used(), (bso#8738). * s3:auth: fill the sids array of the info3 in wbcAuthUserInfo_to_netr_SamInfo3(), (bso#8739). Security Issue references: * CVE-2012-1182 > * CVE-2012-0870 > * CVE-2012-0817 > Affected Software/OS: 'Samba' package(s) on SUSE Linux Enterprise Desktop 11-SP2, SUSE Linux Enterprise Server 11-SP2, SUSE Linux Enterprise Software Development Kit 11-SP2. Solution: Please install the updated package(s). CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0817 47763 http://secunia.com/advisories/47763 48879 http://secunia.com/advisories/48879 FEDORA-2012-1098 http://lists.fedoraproject.org/pipermail/package-announce/2012-February/072930.html SUSE-SU-2012:0502 http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html SUSE-SU-2012:0515 http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html http://www.samba.org/samba/history/samba-3.6.3.html http://www.samba.org/samba/security/CVE-2012-0817 Common Vulnerability Exposure (CVE) ID: CVE-2012-0870 48116 http://secunia.com/advisories/48116 48186 http://secunia.com/advisories/48186 48844 http://secunia.com/advisories/48844 APPLE-SA-2012-05-09-1 http://lists.apple.com/archives/security-announce/2012/May/msg00001.html SUSE-SU-2012:0337 http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00008.html SUSE-SU-2012:0338 http://lists.opensuse.org/opensuse-security-announce/2012-03/msg00009.html USN-1374-1 http://www.ubuntu.com/usn/USN-1374-1 blackberry-playbook-samba-code-execution(73361) https://exchange.xforce.ibmcloud.com/vulnerabilities/73361 http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB29565 http://support.apple.com/kb/HT5281 https://bugzilla.redhat.com/show_bug.cgi?id=795509 Common Vulnerability Exposure (CVE) ID: CVE-2012-1182 Debian Security Information: DSA-2450 (Google Search) http://www.debian.org/security/2012/dsa-2450 http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html HPdes Security Advisory: HPSBMU02790 http://marc.info/?l=bugtraq&m=133951282306605&w=2 HPdes Security Advisory: HPSBUX02789 http://marc.info/?l=bugtraq&m=134323086902585&w=2 HPdes Security Advisory: SSRT100824 HPdes Security Advisory: SSRT100872 http://www.mandriva.com/security/advisories?name=MDVSA-2012:055 http://www.securitytracker.com/id?1026913 http://secunia.com/advisories/48751 http://secunia.com/advisories/48754 http://secunia.com/advisories/48816 http://secunia.com/advisories/48818 http://secunia.com/advisories/48873 http://secunia.com/advisories/48999 SuSE Security Announcement: SUSE-SU-2012:0501 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html SuSE Security Announcement: SUSE-SU-2012:0502 (Google Search) SuSE Security Announcement: SUSE-SU-2012:0504 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html SuSE Security Announcement: SUSE-SU-2012:0515 (Google Search) http://www.ubuntu.com/usn/USN-1423-1 |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |