SuSE 11.2 Security Update : Samba (SAT Patch Number 6145)

This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.


Synopsis :

The remote SuSE 11 host is missing one or more security updates.

Description :

The following issues have been fixed in Samba :

- PIDL based autogenerated code uses client supplied size
values which allows attackers to write beyond the
allocated array size. (CVE-2012-1182)

- Ensure AndX offsets are increasing strictly
monotonically in pre-3.4 versions. (CVE-2012-0870)

- Fix memory leak in parent smbd on connection Also the
following non-security bugs have been fixed :.
(CVE-2012-0817)

- s3-winbindd: Only use SamLogonEx when we can get
unencrypted session keys; (bso#8599).

- Correctly handle DENY ACEs when privileges apply;
(bso#8797).

- s3:smb2_server: fix a logic error, we should sign non
guest sessions; (bso8749).

- Allow vfs_aio_pthread to build as a static module;
(bso#8723).

- s3:dbwrap_ctdb: return the number of records in
db_ctdb_traverse() for persistent dbs; (#bso8527).

- s3: segfault in dom_sid_compare(bso#8567).

- Honor SeTakeOwnershiPrivilege when client asks for
SEC_STD_WRITE_OWNER; (bso#8768).

- s3-winbindd: Close netlogon connection if the status
returned by the NetrSamLogonEx call is timeout in the
pam_auth_crap path; (bso#8771).

- s3-winbindd: set the can_do_validation6 also for trusted
domain; (bso#8599).

- Fix problem when calculating the share security mask,
take priviliges into account for the connecting user;
(bso#8784).

- Fix crash in dcerpc_lsa_lookup_sids_noalloc() with over
1000 groups; (bso#8807);. (bnc#751454)

- Add SERVERID_UNIQUE_ID_NOT_TO_VERIFY; (bso#8760);.
(bnc#741854)

- s3-printing: fix crash in printer_list_set_printer();
(bso#8762);. (bnc#746825)

- s3:winbindd fix a return code check; (bso#8406).

- s3: Add rmdir operation to streams_depot; (bso#8733).

- s3:smbd:smb2: fix an assignment-instead-of-check bug
conn_snum_used(); (bso#8738).

- s3:auth: fill the sids array of the info3 in
wbcAuthUserInfo_to_netr_SamInfo3(); (bso#8739).

- Do not map POSIX execute permission to Windows
FILE_READ_ATTRIBUTES; (bso#8631);. (bnc#732572)

- Remove all precompiled idl output to ensure any pidl
changes take effect;. (bnc#757080)

See also :

https://bugzilla.novell.com/show_bug.cgi?id=732395
https://bugzilla.novell.com/show_bug.cgi?id=732572
https://bugzilla.novell.com/show_bug.cgi?id=741854
https://bugzilla.novell.com/show_bug.cgi?id=743986
https://bugzilla.novell.com/show_bug.cgi?id=746825
https://bugzilla.novell.com/show_bug.cgi?id=747934
https://bugzilla.novell.com/show_bug.cgi?id=751454
https://bugzilla.novell.com/show_bug.cgi?id=752797
https://bugzilla.novell.com/show_bug.cgi?id=757080
http://support.novell.com/security/cve/CVE-2012-0817.html
http://support.novell.com/security/cve/CVE-2012-0870.html
http://support.novell.com/security/cve/CVE-2012-1182.html

Solution :

Apply SAT patch number 6145.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Family: SuSE Local Security Checks

Nessus Plugin ID: 58767 ()

Bugtraq ID:

CVE ID: CVE-2012-0817
CVE-2012-0870
CVE-2012-1182

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now