openSUSE Security Update : cifs-mount (openSUSE-SU-2010:0346-1)

high Nessus Plugin ID 47570

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update of the Samba server package fixes security issues and bugs.

Following security issues were fixed: CVE-2010-2063: A buffer overrun was possible in chain_reply code in 3.3.x and below, which could be used to crash the samba server or potentially execute code.

CVE-2010-0787: Take extra care that a mount point of mount.cifs isn't changed during mount.

Also the following bugs were fixed :

- Honor 'interfaces' list in net ad dns register.
(bnc#606947)

- An uninitialized variable read could cause an smbd crash; (bso#7254); (bnc#605935).

Solution

Update the affected cifs-mount packages.

See Also

https://bugzilla.novell.com/show_bug.cgi?id=550002

https://bugzilla.novell.com/show_bug.cgi?id=577868

https://bugzilla.novell.com/show_bug.cgi?id=605935

https://bugzilla.novell.com/show_bug.cgi?id=606947

https://bugzilla.novell.com/show_bug.cgi?id=611927

https://lists.opensuse.org/opensuse-updates/2010-06/msg00011.html

Plugin Details

Severity: High

ID: 47570

File Name: suse_11_0_cifs-mount-100613.nasl

Version: 1.10

Type: local

Agent: unix

Published: 7/1/2010

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libtalloc1-32bit, p-cpe:/a:novell:opensuse:libnetapi-devel, p-cpe:/a:novell:opensuse:libtdb-devel, p-cpe:/a:novell:opensuse:libtdb1, p-cpe:/a:novell:opensuse:libsmbsharemodes-devel, p-cpe:/a:novell:opensuse:libwbclient0, p-cpe:/a:novell:opensuse:libwbclient-devel, p-cpe:/a:novell:opensuse:libwbclient0-32bit, p-cpe:/a:novell:opensuse:samba-client, p-cpe:/a:novell:opensuse:libtdb1-32bit, p-cpe:/a:novell:opensuse:samba-32bit, p-cpe:/a:novell:opensuse:libnetapi0, p-cpe:/a:novell:opensuse:samba-krb-printing, p-cpe:/a:novell:opensuse:samba-winbind-32bit, cpe:/o:novell:opensuse:11.0, p-cpe:/a:novell:opensuse:samba-devel, p-cpe:/a:novell:opensuse:libsmbsharemodes0, p-cpe:/a:novell:opensuse:libtalloc1, p-cpe:/a:novell:opensuse:samba-winbind, p-cpe:/a:novell:opensuse:samba-client-32bit, p-cpe:/a:novell:opensuse:libtalloc-devel, p-cpe:/a:novell:opensuse:libsmbclient-devel, p-cpe:/a:novell:opensuse:cifs-mount, p-cpe:/a:novell:opensuse:libsmbclient0, p-cpe:/a:novell:opensuse:samba, p-cpe:/a:novell:opensuse:libsmbclient0-32bit, p-cpe:/a:novell:opensuse:ldapsmb

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/13/2010

Exploitable With

Metasploit (Samba chain_reply Memory Corruption (Linux x86))

Reference Information

CVE: CVE-2010-0787, CVE-2010-2063

CWE: 59