SuSE 11.2 Security Update : Samba (SAT Patch Number 6145)

critical Nessus Plugin ID 58767

Synopsis

The remote SuSE 11 host is missing one or more security updates.

Description

The following issues have been fixed in Samba :

- PIDL based autogenerated code uses client supplied size values which allows attackers to write beyond the allocated array size. (CVE-2012-1182)

- Ensure AndX offsets are increasing strictly monotonically in pre-3.4 versions. (CVE-2012-0870)

- Fix memory leak in parent smbd on connection Also the following non-security bugs have been fixed :.
(CVE-2012-0817)

- s3-winbindd: Only use SamLogonEx when we can get unencrypted session keys; (bso#8599).

- Correctly handle DENY ACEs when privileges apply;
(bso#8797).

- s3:smb2_server: fix a logic error, we should sign non guest sessions; (bso8749).

- Allow vfs_aio_pthread to build as a static module;
(bso#8723).

- s3:dbwrap_ctdb: return the number of records in db_ctdb_traverse() for persistent dbs; (#bso8527).

- s3: segfault in dom_sid_compare(bso#8567).

- Honor SeTakeOwnershiPrivilege when client asks for SEC_STD_WRITE_OWNER; (bso#8768).

- s3-winbindd: Close netlogon connection if the status returned by the NetrSamLogonEx call is timeout in the pam_auth_crap path; (bso#8771).

- s3-winbindd: set the can_do_validation6 also for trusted domain; (bso#8599).

- Fix problem when calculating the share security mask, take priviliges into account for the connecting user;
(bso#8784).

- Fix crash in dcerpc_lsa_lookup_sids_noalloc() with over 1000 groups; (bso#8807);. (bnc#751454)

- Add SERVERID_UNIQUE_ID_NOT_TO_VERIFY; (bso#8760);.
(bnc#741854)

- s3-printing: fix crash in printer_list_set_printer();
(bso#8762);. (bnc#746825)

- s3:winbindd fix a return code check; (bso#8406).

- s3: Add rmdir operation to streams_depot; (bso#8733).

- s3:smbd:smb2: fix an assignment-instead-of-check bug conn_snum_used(); (bso#8738).

- s3:auth: fill the sids array of the info3 in wbcAuthUserInfo_to_netr_SamInfo3(); (bso#8739).

- Do not map POSIX execute permission to Windows FILE_READ_ATTRIBUTES; (bso#8631);. (bnc#732572)

- Remove all precompiled idl output to ensure any pidl changes take effect;. (bnc#757080)

Solution

Apply SAT patch number 6145.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=732395

https://bugzilla.novell.com/show_bug.cgi?id=732572

https://bugzilla.novell.com/show_bug.cgi?id=741854

https://bugzilla.novell.com/show_bug.cgi?id=743986

https://bugzilla.novell.com/show_bug.cgi?id=746825

https://bugzilla.novell.com/show_bug.cgi?id=747934

https://bugzilla.novell.com/show_bug.cgi?id=751454

https://bugzilla.novell.com/show_bug.cgi?id=752797

https://bugzilla.novell.com/show_bug.cgi?id=757080

http://support.novell.com/security/cve/CVE-2012-0817.html

http://support.novell.com/security/cve/CVE-2012-0870.html

http://support.novell.com/security/cve/CVE-2012-1182.html

Plugin Details

Severity: Critical

ID: 58767

File Name: suse_11_ldapsmb-120415.nasl

Version: 1.8

Type: local

Agent: unix

Published: 4/17/2012

Updated: 1/19/2021

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:11:ldapsmb, p-cpe:/a:novell:suse_linux:11:libldb1, p-cpe:/a:novell:suse_linux:11:libldb1-32bit, p-cpe:/a:novell:suse_linux:11:libsmbclient0, p-cpe:/a:novell:suse_linux:11:libsmbclient0-32bit, p-cpe:/a:novell:suse_linux:11:libtalloc2, p-cpe:/a:novell:suse_linux:11:libtalloc2-32bit, p-cpe:/a:novell:suse_linux:11:libtdb1, p-cpe:/a:novell:suse_linux:11:libtdb1-32bit, p-cpe:/a:novell:suse_linux:11:libtevent0, p-cpe:/a:novell:suse_linux:11:libtevent0-32bit, p-cpe:/a:novell:suse_linux:11:libwbclient0, p-cpe:/a:novell:suse_linux:11:libwbclient0-32bit, p-cpe:/a:novell:suse_linux:11:samba, p-cpe:/a:novell:suse_linux:11:samba-32bit, p-cpe:/a:novell:suse_linux:11:samba-client, p-cpe:/a:novell:suse_linux:11:samba-client-32bit, p-cpe:/a:novell:suse_linux:11:samba-doc, p-cpe:/a:novell:suse_linux:11:samba-krb-printing, p-cpe:/a:novell:suse_linux:11:samba-winbind, p-cpe:/a:novell:suse_linux:11:samba-winbind-32bit, cpe:/o:novell:suse_linux:11

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/15/2012

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Samba SetInformationPolicy AuditEventsInfo Heap Overflow)

Reference Information

CVE: CVE-2012-0817, CVE-2012-0870, CVE-2012-1182