SuSE 11.1 Security Update : Samba (SAT Patch Number 6124)

critical Nessus Plugin ID 58764

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

A remote code execution flaw in Samba has been fixed :

- PIDL based autogenerated code uses client supplied size values which allows attackers to write beyond the allocated array size. (CVE-2012-1182)

Also the following bugs have been fixed :

- Samba printer name marshalling problems. (bnc#722663)

- mount.cifs: properly update mtab during remount.
(bnc#747906)

- s3: compile IDL files in autogen, some configure tests need this.

- Fix incorrect types in the full audit VFS module. Add null terminators to audit log enums. (bnc#742885)

- Do not map POSIX execute permission to Windows FILE_READ_ATTRIBUTES; (bso#8631);. (bnc#732572)

Solution

Apply SAT patch number 6124.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=722663

https://bugzilla.novell.com/show_bug.cgi?id=732572

https://bugzilla.novell.com/show_bug.cgi?id=742885

https://bugzilla.novell.com/show_bug.cgi?id=747906

https://bugzilla.novell.com/show_bug.cgi?id=752797

http://support.novell.com/security/cve/CVE-2012-1182.html

Plugin Details

Severity: Critical

ID: 58764

File Name: suse_11_cifs-mount-120411.nasl

Version: 1.8

Type: local

Agent: unix

Published: 4/16/2012

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:cifs-mount, p-cpe:/a:novell:suse_linux:11:ldapsmb, p-cpe:/a:novell:suse_linux:11:libsmbclient0, p-cpe:/a:novell:suse_linux:11:libsmbclient0-32bit, p-cpe:/a:novell:suse_linux:11:libtalloc1, p-cpe:/a:novell:suse_linux:11:libtalloc1-32bit, p-cpe:/a:novell:suse_linux:11:libtdb1, p-cpe:/a:novell:suse_linux:11:libtdb1-32bit, p-cpe:/a:novell:suse_linux:11:libwbclient0, p-cpe:/a:novell:suse_linux:11:libwbclient0-32bit, p-cpe:/a:novell:suse_linux:11:samba, p-cpe:/a:novell:suse_linux:11:samba-32bit, p-cpe:/a:novell:suse_linux:11:samba-client, p-cpe:/a:novell:suse_linux:11:samba-client-32bit, p-cpe:/a:novell:suse_linux:11:samba-doc, p-cpe:/a:novell:suse_linux:11:samba-krb-printing, p-cpe:/a:novell:suse_linux:11:samba-winbind, p-cpe:/a:novell:suse_linux:11:samba-winbind-32bit, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/11/2012

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Samba SetInformationPolicy AuditEventsInfo Heap Overflow)

Reference Information

CVE: CVE-2012-1182