openSUSE Security Update : samba (openSUSE-SU-2013:1349-1)

medium Nessus Plugin ID 75121
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update of samba fixed the following issues :

- The pam_winbind require_membership_of option allows for a list of SID, but currently only provides buffer space for ~20; (bnc#806501).

- Samba 3.0.x to 4.0.7 are affected by a denial of service attack on authenticated or guest connections;
CVE-2013-4124; (bnc#829969).

- PIDL: fix parsing linemarkers in preprocessor output;
(bso#9636).

- build:autoconf: fix output of syslog-facility check;
(bso#9983).

- libreplace: add a missing 'eval' to the AC_VERIFY_C_PROTOTYPE macro.

- Remove ldapsmb from the main spec file.

- Don't bzip2 the main tar ball, use the upstream gziped one instead.

- Fix crash bug during Win8 sync; (bso#9822).

- Check for system libtevent and link dbwrap_tool and dbwrap_torture against it; (bso#9881).

- errno gets overwritten in call to check_parent_exists();
(bso#9927).

- Fix a bug of drvupgrade of smbcontrol; (bso#9941).

- Document idmap_ad rfc2307 attribute requirements;
(bso#9880); (bnc#820531).

- Don't package the SWAT man page while its build is disabled; (bnc#816647).

- Don't install the tdb utilities man pages on post-12.1 systems; (bnc#823549).

- Fix libreplace license ambiguity; (bso#8997);
(bnc#765270).

- s3-docs: Remove 'experimental' label on 'max protocol=SMB2' parameter; (bso#9688).

- Remove the compound_related_in_progress state from the smb2 global state; (bso#9722).

- Makefile: Don't know how to make LIBNDR_PREG_OBJ;
(bso#9868).

- Fix is_printer_published GUID retrieval; (bso#9900);
(bnc#798856).

- Fix 'map untrusted to domain' with NTLMv2; (bso#9817);
(bnc#817919).

- Don't modify the pidfile name when a custom config file path is used; (bnc#812929).

- Add extra attributes for AD printer publishing;
(bso#9378); (bnc#798856).

- Fix vfs_catia module; (bso#9701); (bnc#824833). systems;
(bnc#804822); (bnc#821889).

- Fix AD printer publishing; (bso#9378); (bnc#798856).

Solution

Update the affected samba packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=765270

https://bugzilla.novell.com/show_bug.cgi?id=798856

https://bugzilla.novell.com/show_bug.cgi?id=804822

https://bugzilla.novell.com/show_bug.cgi?id=806501

https://bugzilla.novell.com/show_bug.cgi?id=812929

https://bugzilla.novell.com/show_bug.cgi?id=816647

https://bugzilla.novell.com/show_bug.cgi?id=817919

https://bugzilla.novell.com/show_bug.cgi?id=820531

https://bugzilla.novell.com/show_bug.cgi?id=821889

https://bugzilla.novell.com/show_bug.cgi?id=823549

https://bugzilla.novell.com/show_bug.cgi?id=824833

https://bugzilla.novell.com/show_bug.cgi?id=829969

https://lists.opensuse.org/opensuse-updates/2013-08/msg00037.html

Plugin Details

Severity: Medium

ID: 75121

File Name: openSUSE-2013-651.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libnetapi-devel, p-cpe:/a:novell:opensuse:libnetapi0, p-cpe:/a:novell:opensuse:libnetapi0-debuginfo, p-cpe:/a:novell:opensuse:libsmbclient-devel, p-cpe:/a:novell:opensuse:libsmbclient0, p-cpe:/a:novell:opensuse:libsmbclient0-32bit, p-cpe:/a:novell:opensuse:libsmbclient0-debuginfo, p-cpe:/a:novell:opensuse:libsmbclient0-debuginfo-32bit, p-cpe:/a:novell:opensuse:libsmbsharemodes-devel, p-cpe:/a:novell:opensuse:libsmbsharemodes0, p-cpe:/a:novell:opensuse:libsmbsharemodes0-debuginfo, p-cpe:/a:novell:opensuse:libwbclient-devel, p-cpe:/a:novell:opensuse:libwbclient0, p-cpe:/a:novell:opensuse:libwbclient0-32bit, p-cpe:/a:novell:opensuse:libwbclient0-debuginfo, p-cpe:/a:novell:opensuse:libwbclient0-debuginfo-32bit, p-cpe:/a:novell:opensuse:samba, p-cpe:/a:novell:opensuse:samba-32bit, p-cpe:/a:novell:opensuse:samba-client, p-cpe:/a:novell:opensuse:samba-client-32bit, p-cpe:/a:novell:opensuse:samba-client-debuginfo, p-cpe:/a:novell:opensuse:samba-client-debuginfo-32bit, p-cpe:/a:novell:opensuse:samba-debuginfo, p-cpe:/a:novell:opensuse:samba-debuginfo-32bit, p-cpe:/a:novell:opensuse:samba-debugsource, p-cpe:/a:novell:opensuse:samba-devel, p-cpe:/a:novell:opensuse:samba-krb-printing, p-cpe:/a:novell:opensuse:samba-krb-printing-debuginfo, p-cpe:/a:novell:opensuse:samba-winbind, p-cpe:/a:novell:opensuse:samba-winbind-32bit, p-cpe:/a:novell:opensuse:samba-winbind-debuginfo, p-cpe:/a:novell:opensuse:samba-winbind-debuginfo-32bit, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 8/8/2013

Reference Information

CVE: CVE-2013-4124