SuSE 11 Security Update : (SAT Patch Number 2544)

High Nessus Plugin ID 50894

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 7.4

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

This update of the Samba server package fixes the following security issues :

- A buffer overrun was possible in chain_reply code in 3.3.x and below, which could be used to crash the samba server or potentially execute code. (CVE-2010-2063)

- Take extra care that a mount point of mount.cifs does not get changed during mount. (CVE-2010-0787)

Also, the following bugs have been fixed :

- Honor interface list in net ads dns register.
(bnc#606947)

- An uninitialized variable read could cause smbd to crash (bso#7254, bnc#605935).

Solution

Apply SAT patch number 2544.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=550002

https://bugzilla.novell.com/show_bug.cgi?id=577868

https://bugzilla.novell.com/show_bug.cgi?id=605935

https://bugzilla.novell.com/show_bug.cgi?id=606947

https://bugzilla.novell.com/show_bug.cgi?id=611927

http://support.novell.com/security/cve/CVE-2010-0787.html

http://support.novell.com/security/cve/CVE-2010-2063.html

Plugin Details

Severity: High

ID: 50894

File Name: suse_11_cifs-mount-100613.nasl

Version: 1.7

Type: local

Agent: unix

Published: 2010/12/02

Updated: 2019/10/25

Dependencies: 12634

Risk Information

Risk Factor: High

VPR Score: 7.4

CVSS v2.0

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:cifs-mount, p-cpe:/a:novell:suse_linux:11:ldapsmb, p-cpe:/a:novell:suse_linux:11:libsmbclient0, p-cpe:/a:novell:suse_linux:11:libsmbclient0-32bit, p-cpe:/a:novell:suse_linux:11:libtalloc1, p-cpe:/a:novell:suse_linux:11:libtalloc1-32bit, p-cpe:/a:novell:suse_linux:11:libtdb1, p-cpe:/a:novell:suse_linux:11:libtdb1-32bit, p-cpe:/a:novell:suse_linux:11:libwbclient0, p-cpe:/a:novell:suse_linux:11:libwbclient0-32bit, p-cpe:/a:novell:suse_linux:11:samba, p-cpe:/a:novell:suse_linux:11:samba-32bit, p-cpe:/a:novell:suse_linux:11:samba-client, p-cpe:/a:novell:suse_linux:11:samba-client-32bit, p-cpe:/a:novell:suse_linux:11:samba-krb-printing, p-cpe:/a:novell:suse_linux:11:samba-vscan, p-cpe:/a:novell:suse_linux:11:samba-winbind, p-cpe:/a:novell:suse_linux:11:samba-winbind-32bit, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2010/06/13

Exploitable With

Metasploit (Samba chain_reply Memory Corruption (Linux x86))

Reference Information

CVE: CVE-2010-0787, CVE-2010-2063

CWE: 59