openSUSE Security Update : cifs-mount (openSUSE-SU-2010:0346-1)

High Nessus Plugin ID 47572

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 7.4

Synopsis

The remote openSUSE host is missing a security update.

Description

This update of the Samba server package fixes security issues and bugs.

Following security issues were fixed: CVE-2010-2063: A buffer overrun was possible in chain_reply code in 3.3.x and below, which could be used to crash the samba server or potentially execute code.

CVE-2010-0787: Take extra care that a mount point of mount.cifs isn't changed during mount.

Also the following bugs were fixed :

- Honor 'interfaces' list in net ad dns register.
(bnc#606947)

- An uninitialized variable read could cause an smbd crash; (bso#7254); (bnc#605935).

Solution

Update the affected cifs-mount packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=550002

https://bugzilla.novell.com/show_bug.cgi?id=577868

https://bugzilla.novell.com/show_bug.cgi?id=605935

https://bugzilla.novell.com/show_bug.cgi?id=606947

https://bugzilla.novell.com/show_bug.cgi?id=611927

https://lists.opensuse.org/opensuse-updates/2010-06/msg00011.html

Plugin Details

Severity: High

ID: 47572

File Name: suse_11_1_cifs-mount-100613.nasl

Version: 1.9

Type: local

Agent: unix

Published: 2010/07/01

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 7.4

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:cifs-mount, p-cpe:/a:novell:opensuse:ldapsmb, p-cpe:/a:novell:opensuse:libnetapi-devel, p-cpe:/a:novell:opensuse:libnetapi0, p-cpe:/a:novell:opensuse:libsmbclient-devel, p-cpe:/a:novell:opensuse:libsmbclient0, p-cpe:/a:novell:opensuse:libsmbclient0-32bit, p-cpe:/a:novell:opensuse:libsmbsharemodes-devel, p-cpe:/a:novell:opensuse:libsmbsharemodes0, p-cpe:/a:novell:opensuse:libtalloc-devel, p-cpe:/a:novell:opensuse:libtalloc1, p-cpe:/a:novell:opensuse:libtalloc1-32bit, p-cpe:/a:novell:opensuse:libtdb-devel, p-cpe:/a:novell:opensuse:libtdb1, p-cpe:/a:novell:opensuse:libtdb1-32bit, p-cpe:/a:novell:opensuse:libwbclient-devel, p-cpe:/a:novell:opensuse:libwbclient0, p-cpe:/a:novell:opensuse:libwbclient0-32bit, p-cpe:/a:novell:opensuse:samba, p-cpe:/a:novell:opensuse:samba-32bit, p-cpe:/a:novell:opensuse:samba-client, p-cpe:/a:novell:opensuse:samba-client-32bit, p-cpe:/a:novell:opensuse:samba-devel, p-cpe:/a:novell:opensuse:samba-krb-printing, p-cpe:/a:novell:opensuse:samba-vscan, p-cpe:/a:novell:opensuse:samba-winbind, p-cpe:/a:novell:opensuse:samba-winbind-32bit, cpe:/o:novell:opensuse:11.1

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/06/13

Exploitable With

Metasploit (Samba chain_reply Memory Corruption (Linux x86))

Reference Information

CVE: CVE-2010-0787, CVE-2010-2063

CWE: 59