openSUSE Security Update : samba (openSUSE-2017-11)

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote openSUSE host is missing a security update.

Description :

This update for samba fixes the following issues :

Security issues fixed :

- CVE-2016-2125: Don't send delegated credentials to all
servers. (bsc#1014441).

- CVE-2016-2126: Denial of service due to a client
triggered crash in the winbindd parent process.

- CVE-2016-2123: Heap-based Buffer Overflow Remote Code
Execution Vulnerability. (bsc#1014437). The component
affected is not built in our packages.

Non security issues fixed :

- s3/client: obey 'disable netbios' smb.conf param, don't
connect via NBT port; (bsc#1009085)

- Add doc changes for net ads --no-dns-updates switch;

- Include vfstest in samba-test; (bsc#1001203).

- s3/winbindd: using default domain with [email protected]
format fails (bsc#997833).

- Fix illegal memory access after memory has been deleted

- Fix bug in tevent poll backend causing winbind to loop
tightly (bsc#994500).

- Various fixes for spnego/ntlm (bsc#986675). This update
was imported from the SUSE:SLE-12-SP1:Update update

See also :

Solution :

Update the affected samba packages.

Risk factor :


Family: SuSE Local Security Checks

Nessus Plugin ID: 96293 ()

Bugtraq ID:

CVE ID: CVE-2016-2123

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now