openSUSE Security Update : samba (openSUSE-SU-2013:1787-1)

medium Nessus Plugin ID 75215
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote openSUSE host is missing a security update.


the following security issues were fixed in samba :

- ACLs are not checked on opening an alternate data stream on a file or directory; CVE-2013-4475; (bso#10229);

- Fix memleak in reload_printers_full(); (bso#9993).

- Valid utf8 filenames cause 'invalid conversion error' messages; (bso#10139).

- s3: smb2 breaks 'smb encryption = mandatory';

- Missing talloc_free can leak stackframe in error path;

- Offline logon cache not updating for cross child domain group membership; (bso#10194).

- The preceding bugs are tracked by (bnc#849226) too.

- Make Samba work on site with Read Only Domain Controller; (bso#5917).

- Give machine password changes 10 minutes of time;

- NetrServerPasswordSet2 timeout is too short; (bso#8955).

- Fix fallback to ncacn_np in cm_connect_lsat();
(bso#9615); (bso#9899).

- s3-winbind: Do not delete an existing valid credential cache; (bso#9994).

- 'net ads join': Fix segmentation fault in create_local_private_krb5_conf_for_domain; (bso#10073).

- Fix variable list in man vfs_crossrename; (bso#10076).

- MacOSX 10.9 will not follow path-based DFS referrals handed out by Samba; (bso#10097).

- Honour output buffer length set by the client for SMB2 GetInfo requests; (bso#10106).

- Handle Dropbox (write-only-directory) case correctly in pathname lookup; (bso#10114).

- Fix 'smbstatus' as non-root user; (bso#10127).

- The preceding bugs are tracked by (bnc#849226) too.

- Windows 8 Roaming profiles fail; (bso#9678).

- Linux kernel oplock breaks can miss signals;

- The preceding bugs are tracked by (bnc#849226) too.

- Verify source tar ball gpg signature.

- Store and return the correct spoolss jobid in notifications; (bnc#838472).

- Reload snums before processing the printer list.


Update the affected samba packages.

See Also

Plugin Details

Severity: Medium

ID: 75215

File Name: openSUSE-2013-910.nasl

Version: 1.5

Type: local

Agent: unix

Published: 6/13/2014

Updated: 1/19/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: Low

Score: 3.7


Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libnetapi-devel, p-cpe:/a:novell:opensuse:libnetapi0, p-cpe:/a:novell:opensuse:libnetapi0-debuginfo, p-cpe:/a:novell:opensuse:libsmbclient-devel, p-cpe:/a:novell:opensuse:libsmbclient0, p-cpe:/a:novell:opensuse:libsmbclient0-32bit, p-cpe:/a:novell:opensuse:libsmbclient0-debuginfo, p-cpe:/a:novell:opensuse:libsmbclient0-debuginfo-32bit, p-cpe:/a:novell:opensuse:libsmbsharemodes-devel, p-cpe:/a:novell:opensuse:libsmbsharemodes0, p-cpe:/a:novell:opensuse:libsmbsharemodes0-debuginfo, p-cpe:/a:novell:opensuse:libwbclient-devel, p-cpe:/a:novell:opensuse:libwbclient0, p-cpe:/a:novell:opensuse:libwbclient0-32bit, p-cpe:/a:novell:opensuse:libwbclient0-debuginfo, p-cpe:/a:novell:opensuse:libwbclient0-debuginfo-32bit, p-cpe:/a:novell:opensuse:samba, p-cpe:/a:novell:opensuse:samba-32bit, p-cpe:/a:novell:opensuse:samba-client, p-cpe:/a:novell:opensuse:samba-client-32bit, p-cpe:/a:novell:opensuse:samba-client-debuginfo, p-cpe:/a:novell:opensuse:samba-client-debuginfo-32bit, p-cpe:/a:novell:opensuse:samba-debuginfo, p-cpe:/a:novell:opensuse:samba-debuginfo-32bit, p-cpe:/a:novell:opensuse:samba-debugsource, p-cpe:/a:novell:opensuse:samba-devel, p-cpe:/a:novell:opensuse:samba-krb-printing, p-cpe:/a:novell:opensuse:samba-krb-printing-debuginfo, p-cpe:/a:novell:opensuse:samba-winbind, p-cpe:/a:novell:opensuse:samba-winbind-32bit, p-cpe:/a:novell:opensuse:samba-winbind-debuginfo, p-cpe:/a:novell:opensuse:samba-winbind-debuginfo-32bit, cpe:/o:novell:opensuse:12.2, cpe:/o:novell:opensuse:12.3

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 11/12/2013

Reference Information

CVE: CVE-2013-4475

BID: 63646