Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.4.2015.0353.1
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2015:0353-1)
Summary:The remote host is missing an update for the 'samba' package(s) announced via the SUSE-SU-2015:0353-1 advisory.
Description:Summary:
The remote host is missing an update for the 'samba' package(s) announced via the SUSE-SU-2015:0353-1 advisory.

Vulnerability Insight:
samba was updated to fix one security issue.

This security issue was fixed:
- CVE-2015-0240: Don't call talloc_free on an uninitialized pointer
(bnc#917376).

These non-security issues were fixed:
- Fix vfs_snapper DBus string handling (bso#11055, bnc#913238).
- Fix libsmbclient DFS referral handling.
+ Reuse connections derived from DFS referrals (bso#10123).
+ Set domain/workgroup based on authentication callback value
(bso#11059).
- pam_winbind: Fix warn_pwd_expire implementation (bso#9056).
- nsswitch: Fix soname of linux nss_*.so.2 modules (bso#9299).
- Fix profiles tool (bso#9629).
- s3-lib: Do not require a password with --use-ccache (bso#10279).
- s4:dsdb/rootdse: Expand extended dn values with the AS_SYSTEM control
(bso#10949).
- s4-rpc: dnsserver: Fix enumeration of IPv4 and IPv6 addresses
(bso#10952).
- s3:smb2_server: Allow reauthentication without signing (bso#10958).
- s3-smbclient: Return success if we listed the shares (bso#10960).
- s3-smbstatus: Fix exit code of profile output (bso#10961).
- libcli: SMB2: Pure SMB2-only negprot fix to make us behave as a Windows
client does (bso#10966).
- s3: smbd/modules: Fix *allocate* calls to follow POSIX error return
convention (bso#10982).
- Fix 'domain join' by adding 'drsuapi.DsBindInfoFallBack' attribute
'supported_extensions' (bso#11006).
- idl:drsuapi: Manage all possible lengths of drsuapi_DsBindInfo
(bso#11006).
- winbind: Retry LogonControl RPC in ping-dc after session expiration
(bso#11034).
- yast2-samba-client should be able to specify osName and osVer on AD
domain join (bnc#873922).
- Lookup FSRVP share snums at runtime rather than storing them
persistently (bnc#908627).
- Specify soft dependency for network-online.target in Winbind systemd
service file (bnc#889175).
- Fix spoolss error response marshalling, (bso#10984).
- pidl/wscript: Remove --with-perl-* options, revert buildtools/wafadmin/
Tools/perl.py back to upstream state (bso#10472).
- s4-dns: Add support for BIND 9.10 (bso#10620).
- nmbd fails to accept '--piddir' option, (bso#10711).
- S3: source3/smbd/process.c::srv_send_smb() returns true on the error
path (bso#10880).
- vfs_glusterfs: Remove 'integer fd' code and store the glfs pointers
(bso#10889).
- s3-nmbd: Fix netbios name truncation (bso#10896).
- spoolss: Fix handling of bad EnumJobs levels (bso#10898).
- spoolss: Fix jobid in level 3 EnumJobs response, (bso#10905).
- s3: nmbd: Ensure NetBIOS names are only 15 characters stored,
(bso#10920).
- s3:smbd: Fix file corruption using 'write cache size != 0', (bso#10921).
- pdb_tdb: Fix a TALLOC/SAFE_FREE mixup, (bso#10932).
- s3-keytab: Fix keytab array NULL termination, (bso#10933).
- Cleanup add_string_to_array and usage, (bso#10942).
- Remove and cleanup shares and registry state associated with externally
deleted snaphots exposed as shadow copies, (bnc#876312).
- Use the upstream tar ball, as signature verification ... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'samba' package(s) on SUSE Linux Enterprise Desktop 12, SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Software Development Kit 12.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-0240
BugTraq ID: 72711
http://www.securityfocus.com/bid/72711
Debian Security Information: DSA-3171 (Google Search)
http://www.debian.org/security/2015/dsa-3171
https://www.exploit-db.com/exploits/36741/
http://security.gentoo.org/glsa/glsa-201502-15.xml
HPdes Security Advisory: HPSBGN03288
http://marc.info/?l=bugtraq&m=142722696102151&w=2
HPdes Security Advisory: HPSBUX03320
http://marc.info/?l=bugtraq&m=143039217203031&w=2
HPdes Security Advisory: SSRT101952
HPdes Security Advisory: SSRT101979
http://www.mandriva.com/security/advisories?name=MDVSA-2015:081
http://www.mandriva.com/security/advisories?name=MDVSA-2015:082
RedHat Security Advisories: RHSA-2015:0249
http://rhn.redhat.com/errata/RHSA-2015-0249.html
RedHat Security Advisories: RHSA-2015:0250
http://rhn.redhat.com/errata/RHSA-2015-0250.html
RedHat Security Advisories: RHSA-2015:0251
http://rhn.redhat.com/errata/RHSA-2015-0251.html
RedHat Security Advisories: RHSA-2015:0252
http://rhn.redhat.com/errata/RHSA-2015-0252.html
RedHat Security Advisories: RHSA-2015:0253
http://rhn.redhat.com/errata/RHSA-2015-0253.html
RedHat Security Advisories: RHSA-2015:0254
http://rhn.redhat.com/errata/RHSA-2015-0254.html
RedHat Security Advisories: RHSA-2015:0255
http://rhn.redhat.com/errata/RHSA-2015-0255.html
RedHat Security Advisories: RHSA-2015:0256
http://rhn.redhat.com/errata/RHSA-2015-0256.html
RedHat Security Advisories: RHSA-2015:0257
http://rhn.redhat.com/errata/RHSA-2015-0257.html
http://www.securitytracker.com/id/1031783
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.360345
SuSE Security Announcement: SUSE-SU-2015:0353 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00028.html
SuSE Security Announcement: SUSE-SU-2015:0371 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00030.html
SuSE Security Announcement: SUSE-SU-2015:0386 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00035.html
SuSE Security Announcement: openSUSE-SU-2015:0375 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html
SuSE Security Announcement: openSUSE-SU-2016:1064 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
SuSE Security Announcement: openSUSE-SU-2016:1106 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
SuSE Security Announcement: openSUSE-SU-2016:1107 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
http://www.ubuntu.com/usn/USN-2508-1
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2022 E-Soft Inc. All rights reserved.