openSUSE Security Update : samba (openSUSE-2016-490) (Badlock)

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update fixes these security vulnerabilities :

- CVE-2015-5370: DCERPC server and client were vulnerable
to DOS and MITM attacks (bsc#936862).

- CVE-2016-2110: A man-in-the-middle could have downgraded
NTLMSSP authentication (bsc#973031).

- CVE-2016-2111: Domain controller netlogon member
computer could have been spoofed (bsc#973032).

- CVE-2016-2112: LDAP conenctions were vulnerable to
downgrade and MITM attack (bsc#973033).

- CVE-2016-2113: TLS certificate validation were missing
(bsc#973034).

- CVE-2016-2114: 'server signing = mandatory' not enforced
(bsc#973035).

- CVE-2016-2115: Named pipe IPC were vulnerable to MITM
attacks (bsc#973036).

- CVE-2016-2118: 'Badlock' DCERPC impersonation of
authenticated account were possible (bsc#971965).

The openSUSE 13.1 update also upgrades to samba 4.2.4 as 4.1.x
versions are no longer supported by upstream. As a side effect,
libpdb0 package was replaced by libsamba-passdb0.

See also :

https://bugzilla.opensuse.org/show_bug.cgi?id=844720
https://bugzilla.opensuse.org/show_bug.cgi?id=849224
https://bugzilla.opensuse.org/show_bug.cgi?id=853347
https://bugzilla.opensuse.org/show_bug.cgi?id=917376
https://bugzilla.opensuse.org/show_bug.cgi?id=936862
https://bugzilla.opensuse.org/show_bug.cgi?id=958582
https://bugzilla.opensuse.org/show_bug.cgi?id=958583
https://bugzilla.opensuse.org/show_bug.cgi?id=958584
https://bugzilla.opensuse.org/show_bug.cgi?id=958586
https://bugzilla.opensuse.org/show_bug.cgi?id=968222
https://bugzilla.opensuse.org/show_bug.cgi?id=971965
https://bugzilla.opensuse.org/show_bug.cgi?id=973031
https://bugzilla.opensuse.org/show_bug.cgi?id=973032
https://bugzilla.opensuse.org/show_bug.cgi?id=973033
https://bugzilla.opensuse.org/show_bug.cgi?id=973034
https://bugzilla.opensuse.org/show_bug.cgi?id=973035
https://bugzilla.opensuse.org/show_bug.cgi?id=973036
https://bugzilla.samba.org/show_bug.cgi?id=11077
https://bugzilla.samba.org/show_bug.cgi?id=11344
https://bugzilla.samba.org/show_bug.cgi?id=11395
https://bugzilla.samba.org/show_bug.cgi?id=11529
https://bugzilla.samba.org/show_bug.cgi?id=11536
https://bugzilla.samba.org/show_bug.cgi?id=11599
https://bugzilla.samba.org/show_bug.cgi?id=11644
https://bugzilla.samba.org/show_bug.cgi?id=11648
https://bugzilla.samba.org/show_bug.cgi?id=11688
https://bugzilla.samba.org/show_bug.cgi?id=11749
https://bugzilla.samba.org/show_bug.cgi?id=11752
https://bugzilla.samba.org/show_bug.cgi?id=11756
https://bugzilla.samba.org/show_bug.cgi?id=11804

Solution :

Update the affected samba packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
Public Exploit Available : true

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now