SuSE 10 Security Update : Samba (ZYPP Patch Number 7072)

high Nessus Plugin ID 49835

Language:

Synopsis

The remote SuSE 10 host is missing a security-related patch.

Description

This update of the Samba server package fixes the following security issues :

- A buffer overrun was possible in chain_reply code in 3.3.x and below, which could be used to crash the samba server or potentially execute code. (CVE-2010-2063)

- Take extra care that a mount point of mount.cifs does not get changed during mount. (CVE-2010-0787)

Also, the following bugs have been fixed :

- Honor interface list in net ads dns register.
(bnc#606947)

- An uninitialized variable read could cause smbd to crash (bso#7254, bnc#605935).

Solution

Apply ZYPP patch number 7072.

See Also

http://support.novell.com/security/cve/CVE-2010-0787.html

http://support.novell.com/security/cve/CVE-2010-2063.html

Plugin Details

Severity: High

ID: 49835

File Name: suse_cifs-mount-7072.nasl

Version: 1.9

Type: local

Agent: unix

Published: 10/11/2010

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:suse:suse_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/13/2010

Exploitable With

Metasploit (Samba chain_reply Memory Corruption (Linux x86))

Reference Information

CVE: CVE-2010-0787, CVE-2010-2063

CWE: 59