SuSE9 Security Update : Samba (YOU Patch Number 12622)

High Nessus Plugin ID 47568

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 7.4

Synopsis

The remote SuSE 9 host is missing a security-related patch.

Description

This update of the Samba server package fixes the following security issue :

- A buffer overrun was possible in chain_reply code in 3.3.x and below, which could be used to crash the samba server or potentially execute code. (CVE-2010-2063)

Also, the following bug has been fixed :

- An uninitialized variable read could cause smbd to crash (bso#7254, bnc#605935).

Solution

Apply YOU patch number 12622.

See Also

http://support.novell.com/security/cve/CVE-2010-2063.html

Plugin Details

Severity: High

ID: 47568

File Name: suse9_12622.nasl

Version: 1.7

Type: local

Agent: unix

Published: 2010/07/01

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 7.4

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/06/14

Exploitable With

Metasploit (Samba chain_reply Memory Corruption (Linux x86))

Reference Information

CVE: CVE-2010-2063