SuSE 10 Security Update : Samba (ZYPP Patch Number 7072)

High Nessus Plugin ID 49835


The remote SuSE 10 host is missing a security-related patch.


This update of the Samba server package fixes the following security issues :

- A buffer overrun was possible in chain_reply code in 3.3.x and below, which could be used to crash the samba server or potentially execute code. (CVE-2010-2063)

- Take extra care that a mount point of mount.cifs does not get changed during mount. (CVE-2010-0787)

Also, the following bugs have been fixed :

- Honor interface list in net ads dns register.

- An uninitialized variable read could cause smbd to crash (bso#7254, bnc#605935).


Apply ZYPP patch number 7072.

See Also

Plugin Details

Severity: High

ID: 49835

File Name: suse_cifs-mount-7072.nasl

Version: $Revision: 1.6 $

Type: local

Agent: unix

Published: 2010/10/11

Modified: 2012/05/17

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/06/13

Exploitable With

Metasploit (Samba chain_reply Memory Corruption (Linux x86))

Reference Information

CVE: CVE-2010-0787, CVE-2010-2063

CWE: 59