openSUSE Security Update : samba (openSUSE-SU-2014:0405-1)

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

Samba was updated to fix security issues and bugs :

Security issues fixed :

- Password lockout was not enforced for SAMR password
changes, this allowed brute-force attacks on passwords.
CVE-2013-4496; (bnc#849224).

- The DCE-RPC fragment length field is incorrectly
checked, which could expose samba clients to buffer
overflow exploits caused by malicious servers;
CVE-2013-4408; (bnc#844720).

- The pam_winbind login without require_membership_of
restrictions could allow fallbacks to local users even
if they were not intended to be allowed; CVE-2012-6150;

Also non security bugs were fixed :

- Fix problem with server taking too long to respond to a
MSG_PRINTER_DRVUPGRADE message; (bso#9942);

- Fix memory leak in printer_list_get_printer();
(bso#9993); (bnc#865561).

- Depend on %version-%release with all manual Provides and
Requires; (bnc#844307).

- Remove superfluous obsoletes *-64bit in the ifarch ppc64
case; (bnc#437293).

- Fix Winbind 100% CPU utilization caused by domain list
corruption; (bso#10358); (bnc#786677).

- Samba is chatty about being unable to open a printer;

- nsswitch: Fix short writes in winbind_write_sock;

- xattr: fix listing EAs on *BSD for non-root users;

- spoolss: accept XPS_PASS datatype used by Windows 8;

- The preceding bugs are tracked by (bnc#854520) too.

- Make use of the full gpg pub key file name including the
key ID.

- Remove bogus libsmbclient0 package description and
cleanup the libsmbclient line from baselibs.conf;

- Allow smbcacls to take a '--propagate-inheritance' flag
to indicate that the add, delete, modify and set
operations now support automatic propagation of
inheritable ACE(s); (FATE#316474).

- Attempt to use samlogon validation level 6; (bso#7945);

- Recover from ncacn_ip_tcp ACCESS_DENIED/SEC_PKG_ERROR
lsa errors; (bso#7944); (bnc#755663).

- Fix lsa_LookupSids3 and lsa_LookupNames4 arguments.

- Use simplified smb signing infrastructure; (bnc#741623).

See also :

Solution :

Update the affected samba packages.

Risk factor :

High / CVSS Base Score : 8.3
CVSS Temporal Score : 7.2
Public Exploit Available : false

Family: SuSE Local Security Checks

Nessus Plugin ID: 75302 ()

Bugtraq ID: 64101

CVE ID: CVE-2012-6150

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now