ID CVE-2012-1182
Summary The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
References
Vulnerable Configurations
  • Samba 3.0.0
    cpe:2.3:a:samba:samba:3.0.0
  • Samba 3.0.1
    cpe:2.3:a:samba:samba:3.0.1
  • Samba 3.0.2
    cpe:2.3:a:samba:samba:3.0.2
  • Samba 3.0.2a
    cpe:2.3:a:samba:samba:3.0.2:a
  • Samba 3.0.2a
    cpe:2.3:a:samba:samba:3.0.2a
  • Samba 3.0.3
    cpe:2.3:a:samba:samba:3.0.3
  • Samba 3.0.4
    cpe:2.3:a:samba:samba:3.0.4
  • Samba 3.0.4 release candidate 1
    cpe:2.3:a:samba:samba:3.0.4:rc1
  • Samba 3.0.5
    cpe:2.3:a:samba:samba:3.0.5
  • Samba 3.0.6
    cpe:2.3:a:samba:samba:3.0.6
  • Samba 3.0.7
    cpe:2.3:a:samba:samba:3.0.7
  • Samba 3.0.8
    cpe:2.3:a:samba:samba:3.0.8
  • Samba 3.0.9
    cpe:2.3:a:samba:samba:3.0.9
  • Samba 3.0.10
    cpe:2.3:a:samba:samba:3.0.10
  • Samba 3.0.11
    cpe:2.3:a:samba:samba:3.0.11
  • Samba 3.0.12
    cpe:2.3:a:samba:samba:3.0.12
  • Samba 3.0.13
    cpe:2.3:a:samba:samba:3.0.13
  • Samba 3.0.14
    cpe:2.3:a:samba:samba:3.0.14
  • Samba 3.0.14a
    cpe:2.3:a:samba:samba:3.0.14:a
  • Samba 3.0.14a
    cpe:2.3:a:samba:samba:3.0.14a
  • Samba 3.0.15
    cpe:2.3:a:samba:samba:3.0.15
  • Samba 3.0.16
    cpe:2.3:a:samba:samba:3.0.16
  • Samba 3.0.17
    cpe:2.3:a:samba:samba:3.0.17
  • Samba 3.0.18
    cpe:2.3:a:samba:samba:3.0.18
  • Samba 3.0.19
    cpe:2.3:a:samba:samba:3.0.19
  • Samba 3.0.20
    cpe:2.3:a:samba:samba:3.0.20
  • Samba 3.0.20a
    cpe:2.3:a:samba:samba:3.0.20:a
  • Samba 3.0.20b
    cpe:2.3:a:samba:samba:3.0.20:b
  • Samba 3.0.20a
    cpe:2.3:a:samba:samba:3.0.20a
  • Samba 3.0.20b
    cpe:2.3:a:samba:samba:3.0.20b
  • Samba 3.0.21
    cpe:2.3:a:samba:samba:3.0.21
  • Samba 3.0.21a
    cpe:2.3:a:samba:samba:3.0.21:a
  • Samba 3.0.21b
    cpe:2.3:a:samba:samba:3.0.21:b
  • Samba 3.0.21c
    cpe:2.3:a:samba:samba:3.0.21:c
  • Samba 3.0.21a
    cpe:2.3:a:samba:samba:3.0.21a
  • Samba 3.0.21b
    cpe:2.3:a:samba:samba:3.0.21b
  • Samba 3.0.21c
    cpe:2.3:a:samba:samba:3.0.21c
  • Samba 3.0.22
    cpe:2.3:a:samba:samba:3.0.22
  • Samba 3.0.23
    cpe:2.3:a:samba:samba:3.0.23
  • Samba 3.0.23a
    cpe:2.3:a:samba:samba:3.0.23:a
  • Samba 3.0.23b
    cpe:2.3:a:samba:samba:3.0.23:b
  • Samba 3.0.23c
    cpe:2.3:a:samba:samba:3.0.23:c
  • Samba 3.0.23d
    cpe:2.3:a:samba:samba:3.0.23:d
  • Samba 3.0.23a
    cpe:2.3:a:samba:samba:3.0.23a
  • Samba 3.0.23b
    cpe:2.3:a:samba:samba:3.0.23b
  • Samba 3.0.23c
    cpe:2.3:a:samba:samba:3.0.23c
  • Samba 3.0.23d
    cpe:2.3:a:samba:samba:3.0.23d
  • Samba 3.0.24
    cpe:2.3:a:samba:samba:3.0.24
  • Samba 3.0.25
    cpe:2.3:a:samba:samba:3.0.25
  • Samba 3.0.25a
    cpe:2.3:a:samba:samba:3.0.25:a
  • Samba 3.0.25b
    cpe:2.3:a:samba:samba:3.0.25:b
  • Samba 3.0.25c
    cpe:2.3:a:samba:samba:3.0.25:c
  • Samba 3.0.25 pre1
    cpe:2.3:a:samba:samba:3.0.25:pre1
  • Samba 3.0.25 pre2
    cpe:2.3:a:samba:samba:3.0.25:pre2
  • Samba 3.0.25 release candidate 1
    cpe:2.3:a:samba:samba:3.0.25:rc1
  • Samba 3.0.25 release candiate 2
    cpe:2.3:a:samba:samba:3.0.25:rc2
  • Samba 3.0.25 release candidate 3
    cpe:2.3:a:samba:samba:3.0.25:rc3
  • Samba 3.0.25a
    cpe:2.3:a:samba:samba:3.0.25a
  • Samba 3.0.25b
    cpe:2.3:a:samba:samba:3.0.25b
  • Samba 3.0.25c
    cpe:2.3:a:samba:samba:3.0.25c
  • Samba 3.0.26
    cpe:2.3:a:samba:samba:3.0.26
  • Samba 3.0.26a
    cpe:2.3:a:samba:samba:3.0.26:a
  • Samba 3.0.26a
    cpe:2.3:a:samba:samba:3.0.26a
  • Samba 3.0.27
    cpe:2.3:a:samba:samba:3.0.27
  • Samba 3.0.27a
    cpe:2.3:a:samba:samba:3.0.27:a
  • Samba 3.0.28
    cpe:2.3:a:samba:samba:3.0.28
  • Samba 3.0.28a
    cpe:2.3:a:samba:samba:3.0.28:a
  • Samba 3.0.29
    cpe:2.3:a:samba:samba:3.0.29
  • Samba 3.0.30
    cpe:2.3:a:samba:samba:3.0.30
  • Samba 3.0.31
    cpe:2.3:a:samba:samba:3.0.31
  • Samba 3.0.32
    cpe:2.3:a:samba:samba:3.0.32
  • Samba 3.0.33
    cpe:2.3:a:samba:samba:3.0.33
  • Samba 3.0.34
    cpe:2.3:a:samba:samba:3.0.34
  • Samba 3.0.35
    cpe:2.3:a:samba:samba:3.0.35
  • Samba 3.0.36
    cpe:2.3:a:samba:samba:3.0.36
  • Samba 3.0.37
    cpe:2.3:a:samba:samba:3.0.37
  • Samba 3.1.0
    cpe:2.3:a:samba:samba:3.1.0
  • Samba 3.2.0
    cpe:2.3:a:samba:samba:3.2.0
  • Samba 3.2.1
    cpe:2.3:a:samba:samba:3.2.1
  • Samba 3.2.2
    cpe:2.3:a:samba:samba:3.2.2
  • Samba 3.2.3
    cpe:2.3:a:samba:samba:3.2.3
  • Samba 3.2.4
    cpe:2.3:a:samba:samba:3.2.4
  • Samba 3.2.5
    cpe:2.3:a:samba:samba:3.2.5
  • Samba 3.2.6
    cpe:2.3:a:samba:samba:3.2.6
  • Samba 3.2.7
    cpe:2.3:a:samba:samba:3.2.7
  • Samba 3.2.8
    cpe:2.3:a:samba:samba:3.2.8
  • Samba 3.2.9
    cpe:2.3:a:samba:samba:3.2.9
  • Samba 3.2.10
    cpe:2.3:a:samba:samba:3.2.10
  • Samba 3.2.11
    cpe:2.3:a:samba:samba:3.2.11
  • Samba 3.2.12
    cpe:2.3:a:samba:samba:3.2.12
  • Samba 3.2.13
    cpe:2.3:a:samba:samba:3.2.13
  • Samba 3.2.14
    cpe:2.3:a:samba:samba:3.2.14
  • Samba 3.2.15
    cpe:2.3:a:samba:samba:3.2.15
  • Samba 3.3.0
    cpe:2.3:a:samba:samba:3.3.0
  • Samba 3.3.1
    cpe:2.3:a:samba:samba:3.3.1
  • Samba 3.3.2
    cpe:2.3:a:samba:samba:3.3.2
  • Samba 3.3.3
    cpe:2.3:a:samba:samba:3.3.3
  • Samba 3.3.4
    cpe:2.3:a:samba:samba:3.3.4
  • Samba 3.3.5
    cpe:2.3:a:samba:samba:3.3.5
  • Samba 3.3.6
    cpe:2.3:a:samba:samba:3.3.6
  • Samba 3.3.7
    cpe:2.3:a:samba:samba:3.3.7
  • Samba 3.3.8
    cpe:2.3:a:samba:samba:3.3.8
  • Samba 3.3.9
    cpe:2.3:a:samba:samba:3.3.9
  • Samba 3.3.10
    cpe:2.3:a:samba:samba:3.3.10
  • Samba 3.3.11
    cpe:2.3:a:samba:samba:3.3.11
  • Samba 3.3.12
    cpe:2.3:a:samba:samba:3.3.12
  • Samba 3.3.13
    cpe:2.3:a:samba:samba:3.3.13
  • Samba 3.3.14
    cpe:2.3:a:samba:samba:3.3.14
  • Samba 3.3.15
    cpe:2.3:a:samba:samba:3.3.15
  • Samba 3.3.16
    cpe:2.3:a:samba:samba:3.3.16
  • Samba 3.4.0
    cpe:2.3:a:samba:samba:3.4.0
  • Samba 3.4.1
    cpe:2.3:a:samba:samba:3.4.1
  • Samba 3.4.2
    cpe:2.3:a:samba:samba:3.4.2
  • Samba 3.4.3
    cpe:2.3:a:samba:samba:3.4.3
  • Samba 3.4.4
    cpe:2.3:a:samba:samba:3.4.4
  • Samba 3.4.5
    cpe:2.3:a:samba:samba:3.4.5
  • Samba 3.4.6
    cpe:2.3:a:samba:samba:3.4.6
  • Samba 3.4.7
    cpe:2.3:a:samba:samba:3.4.7
  • Samba 3.4.8
    cpe:2.3:a:samba:samba:3.4.8
  • Samba 3.4.9
    cpe:2.3:a:samba:samba:3.4.9
  • Samba 3.4.10
    cpe:2.3:a:samba:samba:3.4.10
  • Samba 3.4.11
    cpe:2.3:a:samba:samba:3.4.11
  • Samba 3.4.12
    cpe:2.3:a:samba:samba:3.4.12
  • Samba 3.4.13
    cpe:2.3:a:samba:samba:3.4.13
  • Samba 3.4.14
    cpe:2.3:a:samba:samba:3.4.14
  • Samba 3.4.15
    cpe:2.3:a:samba:samba:3.4.15
  • Samba 3.5.0
    cpe:2.3:a:samba:samba:3.5.0
  • Samba 3.5.1
    cpe:2.3:a:samba:samba:3.5.1
  • Samba 3.5.2
    cpe:2.3:a:samba:samba:3.5.2
  • Samba 3.5.3
    cpe:2.3:a:samba:samba:3.5.3
  • Samba 3.5.4
    cpe:2.3:a:samba:samba:3.5.4
  • Samba 3.5.5
    cpe:2.3:a:samba:samba:3.5.5
  • Samba 3.5.6
    cpe:2.3:a:samba:samba:3.5.6
  • Samba 3.5.7
    cpe:2.3:a:samba:samba:3.5.7
  • Samba 3.5.8
    cpe:2.3:a:samba:samba:3.5.8
  • Samba 3.5.9
    cpe:2.3:a:samba:samba:3.5.9
  • Samba 3.5.10
    cpe:2.3:a:samba:samba:3.5.10
  • Samba 3.5.11
    cpe:2.3:a:samba:samba:3.5.11
  • Samba 3.5.12
    cpe:2.3:a:samba:samba:3.5.12
  • Samba 3.5.13
    cpe:2.3:a:samba:samba:3.5.13
  • Samba 3.6.0
    cpe:2.3:a:samba:samba:3.6.0
  • Samba 3.6.1
    cpe:2.3:a:samba:samba:3.6.1
  • Samba 3.6.2
    cpe:2.3:a:samba:samba:3.6.2
  • Samba 3.6.3
    cpe:2.3:a:samba:samba:3.6.3
CVSS
Base: 10.0 (as of 11-04-2012 - 13:23)
Impact:
Exploitability:
CWE CWE-189
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
exploit-db via4
description Samba SetInformationPolicy AuditEventsInfo Heap Overflow. CVE-2012-1182. Remote exploit for linux platform
id EDB-ID:21850
last seen 2016-02-02
modified 2012-10-10
published 2012-10-10
reporter metasploit
source https://www.exploit-db.com/download/21850/
title Samba SetInformationPolicy AuditEventsInfo Heap Overflow
metasploit via4
description This module triggers a vulnerability in the LSA RPC service of the Samba daemon because of an error on the PIDL auto-generated code. Making a specially crafted call to SetInformationPolicy to set a PolicyAuditEventsInformation allows to trigger a heap overflow and finally execute arbitrary code with root privileges. The module uses brute force to guess the stackpivot/rop chain or the system() address and redirect flow there in order to bypass NX. The start and stop addresses for brute forcing have been calculated empirically. On the other hand the module provides the StartBrute and StopBrute which allow the user to configure his own addresses.
id MSF:EXPLOIT/LINUX/SAMBA/SETINFOPOLICY_HEAP
last seen 2019-03-26
modified 2017-07-24
published 2012-09-27
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/samba/setinfopolicy_heap.rb
title Samba SetInformationPolicy AuditEventsInfo Heap Overflow
nessus via4
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_LDAPSMB-120415.NASL
    description The following issues have been fixed in Samba : - PIDL based autogenerated code uses client supplied size values which allows attackers to write beyond the allocated array size. (CVE-2012-1182) - Ensure AndX offsets are increasing strictly monotonically in pre-3.4 versions. (CVE-2012-0870) - Fix memory leak in parent smbd on connection Also the following non-security bugs have been fixed :. (CVE-2012-0817) - s3-winbindd: Only use SamLogonEx when we can get unencrypted session keys; (bso#8599). - Correctly handle DENY ACEs when privileges apply; (bso#8797). - s3:smb2_server: fix a logic error, we should sign non guest sessions; (bso8749). - Allow vfs_aio_pthread to build as a static module; (bso#8723). - s3:dbwrap_ctdb: return the number of records in db_ctdb_traverse() for persistent dbs; (#bso8527). - s3: segfault in dom_sid_compare(bso#8567). - Honor SeTakeOwnershiPrivilege when client asks for SEC_STD_WRITE_OWNER; (bso#8768). - s3-winbindd: Close netlogon connection if the status returned by the NetrSamLogonEx call is timeout in the pam_auth_crap path; (bso#8771). - s3-winbindd: set the can_do_validation6 also for trusted domain; (bso#8599). - Fix problem when calculating the share security mask, take priviliges into account for the connecting user; (bso#8784). - Fix crash in dcerpc_lsa_lookup_sids_noalloc() with over 1000 groups; (bso#8807);. (bnc#751454) - Add SERVERID_UNIQUE_ID_NOT_TO_VERIFY; (bso#8760);. (bnc#741854) - s3-printing: fix crash in printer_list_set_printer(); (bso#8762);. (bnc#746825) - s3:winbindd fix a return code check; (bso#8406). - s3: Add rmdir operation to streams_depot; (bso#8733). - s3:smbd:smb2: fix an assignment-instead-of-check bug conn_snum_used(); (bso#8738). - s3:auth: fill the sids array of the info3 in wbcAuthUserInfo_to_netr_SamInfo3(); (bso#8739). - Do not map POSIX execute permission to Windows FILE_READ_ATTRIBUTES; (bso#8631);. (bnc#732572) - Remove all precompiled idl output to ensure any pidl changes take effect;. (bnc#757080)
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 58767
    published 2012-04-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58767
    title SuSE 11.2 Security Update : Samba (SAT Patch Number 6145)
  • NASL family Gentoo Local Security Checks
    NASL id GENTOO_GLSA-201206-22.NASL
    description The remote host is affected by the vulnerability described in GLSA-201206-22 (Samba: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Samba. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code with root privileges, cause a Denial of Service condition, take ownership of shared files, or bypass file permissions. Furthermore, a local attacker may be able to cause a Denial of Service condition or obtain sensitive information in a Samba credentials file. Workaround : There is no known workaround at this time.
    last seen 2019-02-21
    modified 2018-07-11
    plugin id 59675
    published 2012-06-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=59675
    title GLSA-201206-22 : Samba: Multiple vulnerabilities
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2012-002.NASL
    description The remote host is running a version of Mac OS X 10.6 that does not have Security Update 2012-002 applied. This update contains multiple security-related fixes for the following components : - curl - Directory Service - ImageIO - libarchive - libsecurity - libxml - Quartz Composer - QuickTime - Ruby - Samba - Security Framework
    last seen 2019-02-21
    modified 2018-07-14
    plugin id 59067
    published 2012-05-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=59067
    title Mac OS X Multiple Vulnerabilities (Security Update 2012-002) (BEAST)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-223.NASL
    description - Add the ldapsmb sources as else patches against them have no chance to apply. - Samba pre-3.6.4 are affected by a vulnerability that allows remote code exe- cution as the 'root' user; PIDL based autogenerated code allows overwriting beyond of allocated array; CVE-2012-1182; (bso#8815); (bnc#752797). - s3-winbindd: Only use SamLogonEx when we can get unencrypted session keys; (bso#8599). - Correctly handle DENY ACEs when privileges apply; (bso#8797). - s3:smb2_server: fix a logic error, we should sign non guest sessions; (bso8749). - Allow vfs_aio_pthread to build as a static module; (bso#8723). - s3:dbwrap_ctdb: return the number of records in db_ctdb_traverse() for persistent dbs; (#bso8527). - s3: segfault in dom_sid_compare(bso#8567). - Honor SeTakeOwnershiPrivilege when client asks for SEC_STD_WRITE_OWNER; (bso#8768). - s3-winbindd: Close netlogon connection if the status returned by the NetrSamLogonEx call is timeout in the pam_auth_crap path; (bso#8771). - s3-winbindd: set the can_do_validation6 also for trusted domain; (bso#8599). - Fix problem when calculating the share security mask, take priviliges into account for the connecting user; (bso#8784). - Fix crash in dcerpc_lsa_lookup_sids_noalloc() with over 1000 groups; (bso#8807); (bnc#751454). - Remove obsoleted Authors lines from spec file for post-11.2 systems. - Make ldapsmb build with Fedora 15 and 16; (bso#8783). - BuildRequire libuuid-devel for post-11.0 and other systems. - Define missing python macros for non SUSE systems. - PreReq to fillup_prereq and insserv_prereq only on SUSE systems. - Always use cifstab instead of smbfstab on non SUSE systems. - Ensure AndX offsets are increasing strictly monotonically in pre-3.4 versions; CVE-2012-0870; (bnc#747934). - Add SERVERID_UNIQUE_ID_NOT_TO_VERIFY; (bso#8760); (bnc#741854). - s3-printing: fix crash in printer_list_set_printer(); (bso#8762); (bnc#746825).
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74600
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74600
    title openSUSE Security Update : samba (openSUSE-SU-2012:0507-1)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120410_SAMBA3X_ON_SL5_X.NASL
    description Samba is an open source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. A remote, unauthenticated attacker could send a specially crafted RPC request that would cause the Samba daemon (smbd) to crash or, possibly, execute arbitrary code with the privileges of the root user. (CVE-2012-1182) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the smb service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61297
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61297
    title Scientific Linux Security Update : samba3x on SL5.x i386/x86_64
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2012-224.NASL
    description Samba upgrade to version 3.6.3 fixes the following security issue : - PIDL based autogenerated code allows overwriting beyond of allocated array. Remove attackers could exploit that to execute arbitrary code as root (CVE-2012-1182, bso#8815, bnc#752797) Please see /usr/share/doc/packages/samba/WHATSNEW.txt from the samba-doc package or the package change log (rpm -q --changelog samba) for more details of the version update.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 74601
    published 2014-06-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=74601
    title openSUSE Security Update : samba (openSUSE-SU-2012:0508-1)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-5805.NASL
    description Fix for CVE-2012-1182. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 58823
    published 2012-04-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58823
    title Fedora 15 : samba-3.5.14-73.fc15.1 (2012-5805)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-1423-1.NASL
    description Brian Gorenc discovered that Samba incorrectly calculated array bounds when handling remote procedure calls (RPC) over the network. A remote, unauthenticated attacker could exploit this to execute arbitrary code as the root user. (CVE-2012-1182). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 58743
    published 2012-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58743
    title Ubuntu 8.04 LTS / 10.04 LTS / 11.04 / 11.10 : samba vulnerability (USN-1423-1)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0478.NASL
    description Description of changes: [3.0.33-3.36.el4] - Security Release, fixes CVE-2012-1182 - resolves: #812010
    last seen 2019-01-03
    modified 2019-01-02
    plugin id 68512
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68512
    title Oracle Linux 4 : samba (ELSA-2012-0478)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0466.NASL
    description Updated samba3x packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 5.6 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is an open source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. A remote, unauthenticated attacker could send a specially crafted RPC request that would cause the Samba daemon (smbd) to crash or, possibly, execute arbitrary code with the privileges of the root user. (CVE-2012-1182) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the smb service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 58673
    published 2012-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58673
    title RHEL 5 : samba3x (RHSA-2012:0466)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2013-0506.NASL
    description Updated samba4 packages that fix one security issue, multiple bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is an open source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw was found in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls. This could result in code generated by the PIDL compiler to not sufficiently protect against buffer overflows. (CVE-2012-1182) The samba4 packages have been upgraded to upstream version 4.0.0, which provides a number of bug fixes and enhancements over the previous version. In particular, improved interoperability with Active Directory (AD) domains. SSSD now uses the libndr-krb5pac library to parse the Privilege Attribute Certificate (PAC) issued by an AD Key Distribution Center (KDC). The Cross Realm Kerberos Trust functionality provided by Identity Management, which relies on the capabilities of the samba4 client library, is included as a Technology Preview. This functionality and server libraries, is included as a Technology Preview. This functionality uses the libndr-nbt library to prepare Connection-less Lightweight Directory Access Protocol (CLDAP) messages. Additionally, various improvements have been made to the Local Security Authority (LSA) and Net Logon services to allow verification of trust from a Windows system. Because the Cross Realm Kerberos Trust functionality is considered a Technology Preview, selected samba4 components are considered to be a Technology Preview. For more information on which Samba packages are considered a Technology Preview, refer to Table 5.1, 'Samba4 Package Support' in the Release Notes, linked to from the References. (BZ#766333, BZ#882188) This update also fixes the following bug : * Prior to this update, if the Active Directory (AD) server was rebooted, Winbind sometimes failed to reconnect when requested by 'wbinfo -n' or 'wbinfo -s' commands. Consequently, looking up users using the wbinfo tool failed. This update applies upstream patches to fix this problem and now looking up a Security Identifier (SID) for a username, or a username for a given SID, works as expected after a domain controller is rebooted. (BZ#878564) All users of samba4 are advised to upgrade to these updated packages, which fix these issues and add these enhancements. Warning: If you upgrade from Red Hat Enterprise Linux 6.3 to Red Hat Enterprise Linux 6.4 and you have Samba in use, you should make sure that you uninstall the package named 'samba4' to avoid conflicts during the upgrade.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 65141
    published 2013-03-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65141
    title CentOS 6 : samba4 (CESA-2013:0506)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0465.NASL
    description Updated samba packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6; Red Hat Enterprise Linux 5.3 Long Life; and Red Hat Enterprise Linux 5.6, 6.0 and 6.1 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is an open source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. A remote, unauthenticated attacker could send a specially crafted RPC request that would cause the Samba daemon (smbd) to crash or, possibly, execute arbitrary code with the privileges of the root user. (CVE-2012-1182) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the smb service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 58663
    published 2012-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58663
    title CentOS 5 / 6 : samba (CESA-2012:0465)
  • NASL family Misc.
    NASL id SAMBA_RPC_MULTIPLE_BUFFER_OVERFLOWS.NASL
    description According to its banner, the version of Samba 3.x running on the remote host is earlier than 3.6.4 / 3.5.14 / 3.4.16. It is, therefore, affected by multiple heap-based buffer overflow vulnerabilities. An error in the DCE/RPC IDL (PIDL) compiler causes the RPC handling code it generates to contain multiple heap-based buffer overflow vulnerabilities. This generated code can allow a remote, unauthenticated attacker to use malicious RPC calls to crash the application and possibly execute arbitrary code as the root user. Note that Nessus has not actually tried to exploit this issue or otherwise determine if one of the associated patches has been applied.
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 58662
    published 2012-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58662
    title Samba 3.x < 3.6.4 / 3.5.14 / 3.4.16 RPC Multiple Buffer Overflows
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2013-0515.NASL
    description Updated openchange packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The openchange packages provide libraries to access Microsoft Exchange servers using native protocols. Evolution-MAPI uses these libraries to integrate the Evolution PIM application with Microsoft Exchange servers. A flaw was found in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler. As OpenChange uses code generated by PIDL, this could have resulted in buffer overflows in the way OpenChange handles RPC calls. With this update, the code has been generated with an updated version of PIDL to correct this issue. (CVE-2012-1182) The openchange packages have been upgraded to upstream version 1.0, which provides a number of bug fixes and enhancements over the previous version, including support for the rebased samba4 packages and several API changes. (BZ#767672, BZ#767678) This update also fixes the following bugs : * When the user tried to modify a meeting with one required attendee and himself as the organizer, a segmentation fault occurred in the memcpy() function. Consequently, the evolution-data-server application terminated unexpectedly with a segmentation fault. This bug has been fixed and evolution-data-server no longer crashes in the described scenario. (BZ#680061) * Prior to this update, OpenChange 1.0 was unable to send messages with a large message body or with extensive attachment. This was caused by minor issues in OpenChange's exchange.idl definitions. This bug has been fixed and OpenChange now sends extensive messages without complications. (BZ#870405) All users of openchange are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 65147
    published 2013-03-10
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65147
    title CentOS 6 : evolution-mapi / openchange (CESA-2013:0515)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-6349.NASL
    description This update fixes CVE-2012-1182. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 58980
    published 2012-05-04
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58980
    title Fedora 15 : samba4-4.0.0-26.alpha11.fc15.6 (2012-6349)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_BAF37CD2835111E1894E00215C6A37BB.NASL
    description Samba development team reports : Samba versions 3.6.3 and all versions previous to this are affected by a vulnerability that allows remote code execution as the 'root' user from an anonymous connection. As this does not require an authenticated connection it is the most serious vulnerability possible in a program, and users and vendors are encouraged to patch their Samba installations immediately.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 58671
    published 2012-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58671
    title FreeBSD : samba -- 'root' credential remote code execution (baf37cd2-8351-11e1-894e-00215c6a37bb)
  • NASL family Solaris Local Security Checks
    NASL id SOLARIS11_SAMBA_20121016.NASL
    description The remote Solaris system is missing necessary patches to address security updates : - The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call. (CVE-2012-1182)
    last seen 2019-02-21
    modified 2018-11-15
    plugin id 80762
    published 2015-01-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=80762
    title Oracle Solaris Third-Party Patch Update : samba (cve_2012_1182_arbitrary_code)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-5793.NASL
    description Fixes CVE-2010-1182. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 58789
    published 2012-04-19
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58789
    title Fedora 17 : samba-3.6.4-82.fc17.1 (2012-5793)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-2450.NASL
    description It was discovered that Samba, the SMB/CIFS file, print, and login server, contained a flaw in the remote procedure call (RPC) code which allowed remote code execution as the super user from an unauthenticated connection.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 58729
    published 2012-04-13
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58729
    title Debian DSA-2450-1 : samba - privilege escalation
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-5843.NASL
    description Fixes CVE-2010-1182. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2015-10-20
    plugin id 58755
    published 2012-04-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58755
    title Fedora 16 : samba-3.6.4-82.fc16 (2012-5843)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20130221_OPENCHANGE_ON_SL6_X.NASL
    description A flaw was found in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler. As OpenChange uses code generated by PIDL, this could have resulted in buffer overflows in the way OpenChange handles RPC calls. With this update, the code has been generated with an updated version of PIDL to correct this issue. (CVE-2012-1182) The openchange packages have been upgraded to upstream version 1.0, which provides a number of bug fixes and enhancements over the previous version, including support for the rebased samba4 packages and several API changes. This update also fixes the following bugs : - When the user tried to modify a meeting with one required attendee and himself as the organizer, a segmentation fault occurred in the memcpy() function. Consequently, the evolution-data-server application terminated unexpectedly with a segmentation fault. This bug has been fixed and evolution- data-server no longer crashes in the described scenario. - Prior to this update, OpenChange 1.0 was unable to send messages with a large message body or with extensive attachment. This was caused by minor issues in OpenChange's exchange.idl definitions. This bug has been fixed and OpenChange now sends extensive messages without complications.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 65013
    published 2013-03-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65013
    title Scientific Linux Security Update : openchange on SL6.x i386/x86_64
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2012-0466.NASL
    description Updated samba3x packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 5.6 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is an open source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. A remote, unauthenticated attacker could send a specially crafted RPC request that would cause the Samba daemon (smbd) to crash or, possibly, execute arbitrary code with the privileges of the root user. (CVE-2012-1182) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the smb service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 58664
    published 2012-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58664
    title CentOS 5 : samba3x (CESA-2012:0466)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20130221_SAMBA4_ON_SL6_X.NASL
    description A flaw was found in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls. This could result in code generated by the PIDL compiler to not sufficiently protect against buffer overflows. (CVE-2012-1182) The samba4 packages have been upgraded to upstream version 4.0.0, which provides a number of bug fixes and enhancements over the previous version. In particular, improved interoperability with Active Directory (AD) domains. SSSD now uses the libndr-krb5pac library to parse the Privilege Attribute Certificate (PAC) issued by an AD Key Distribution Center (KDC). The Cross Realm Kerberos Trust functionality provided by Identity Management, which relies on the capabilities of the samba4 client library, is included as a Technology Preview. This functionality and server libraries, is included as a Technology Preview. This functionality uses the libndr-nbt library to prepare Connection-less Lightweight Directory Access Protocol (CLDAP) messages. Additionally, various improvements have been made to the Local Security Authority (LSA) and Net Logon services to allow verification of trust from a Windows system. Because the Cross Realm Kerberos Trust functionality is considered a Technology Preview, selected samba4 components are considered to be a Technology Preview. For more information on which Samba packages are considered a Technology Preview, refer to Table 5.1, 'Samba4 Package Support' in the Release Notes, linked to from the References. This update also fixes the following bug : - Prior to this update, if the Active Directory (AD) server was rebooted, Winbind sometimes failed to reconnect when requested by 'wbinfo -n' or 'wbinfo -s' commands. Consequently, looking up users using the wbinfo tool failed. This update applies upstream patches to fix this problem and now looking up a Security Identifier (SID) for a username, or a username for a given SID, works as expected after a domain controller is rebooted. Warning: If you upgrade from Scientific Linux 6.3 to Scientific Linux 6.4 and you have Samba in use, you should make sure that you uninstall the package named 'samba4' to avoid conflicts during the upgrade.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 65015
    published 2013-03-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=65015
    title Scientific Linux Security Update : samba4 on SL6.x i386/x86_64
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0465.NASL
    description From Red Hat Security Advisory 2012:0465 : Updated samba packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6; Red Hat Enterprise Linux 5.3 Long Life; and Red Hat Enterprise Linux 5.6, 6.0 and 6.1 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is an open source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. A remote, unauthenticated attacker could send a specially crafted RPC request that would cause the Samba daemon (smbd) to crash or, possibly, execute arbitrary code with the privileges of the root user. (CVE-2012-1182) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the smb service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68506
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68506
    title Oracle Linux 5 / 6 : samba (ELSA-2012-0465)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2013-0515.NASL
    description Updated openchange packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The openchange packages provide libraries to access Microsoft Exchange servers using native protocols. Evolution-MAPI uses these libraries to integrate the Evolution PIM application with Microsoft Exchange servers. A flaw was found in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler. As OpenChange uses code generated by PIDL, this could have resulted in buffer overflows in the way OpenChange handles RPC calls. With this update, the code has been generated with an updated version of PIDL to correct this issue. (CVE-2012-1182) The openchange packages have been upgraded to upstream version 1.0, which provides a number of bug fixes and enhancements over the previous version, including support for the rebased samba4 packages and several API changes. (BZ#767672, BZ#767678) This update also fixes the following bugs : * When the user tried to modify a meeting with one required attendee and himself as the organizer, a segmentation fault occurred in the memcpy() function. Consequently, the evolution-data-server application terminated unexpectedly with a segmentation fault. This bug has been fixed and evolution-data-server no longer crashes in the described scenario. (BZ#680061) * Prior to this update, OpenChange 1.0 was unable to send messages with a large message body or with extensive attachment. This was caused by minor issues in OpenChange's exchange.idl definitions. This bug has been fixed and OpenChange now sends extensive messages without complications. (BZ#870405) All users of openchange are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-11-10
    plugin id 64763
    published 2013-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64763
    title RHEL 6 : openchange (RHSA-2013:0515)
  • NASL family Fedora Local Security Checks
    NASL id FEDORA_2012-6382.NASL
    description This update fixes CVE-2012-1182. Rebuilt to run with pytalloc 2.0.6 New samba4 alpha release. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-11-28
    plugin id 59098
    published 2012-05-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=59098
    title Fedora 16 : samba4-4.0.0-38.alpha16.fc16 (2012-6382)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_11_CIFS-MOUNT-120411.NASL
    description A remote code execution flaw in Samba has been fixed : - PIDL based autogenerated code uses client supplied size values which allows attackers to write beyond the allocated array size. (CVE-2012-1182) Also the following bugs have been fixed : - Samba printer name marshalling problems. (bnc#722663) - mount.cifs: properly update mtab during remount. (bnc#747906) - s3: compile IDL files in autogen, some configure tests need this. - Fix incorrect types in the full audit VFS module. Add null terminators to audit log enums. (bnc#742885) - Do not map POSIX execute permission to Windows FILE_READ_ATTRIBUTES; (bso#8631);. (bnc#732572)
    last seen 2019-02-21
    modified 2013-10-25
    plugin id 58764
    published 2012-04-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58764
    title SuSE 11.1 Security Update : Samba (SAT Patch Number 6124)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2013-0506.NASL
    description From Red Hat Security Advisory 2013:0506 : Updated samba4 packages that fix one security issue, multiple bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is an open source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw was found in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls. This could result in code generated by the PIDL compiler to not sufficiently protect against buffer overflows. (CVE-2012-1182) The samba4 packages have been upgraded to upstream version 4.0.0, which provides a number of bug fixes and enhancements over the previous version. In particular, improved interoperability with Active Directory (AD) domains. SSSD now uses the libndr-krb5pac library to parse the Privilege Attribute Certificate (PAC) issued by an AD Key Distribution Center (KDC). The Cross Realm Kerberos Trust functionality provided by Identity Management, which relies on the capabilities of the samba4 client library, is included as a Technology Preview. This functionality and server libraries, is included as a Technology Preview. This functionality uses the libndr-nbt library to prepare Connection-less Lightweight Directory Access Protocol (CLDAP) messages. Additionally, various improvements have been made to the Local Security Authority (LSA) and Net Logon services to allow verification of trust from a Windows system. Because the Cross Realm Kerberos Trust functionality is considered a Technology Preview, selected samba4 components are considered to be a Technology Preview. For more information on which Samba packages are considered a Technology Preview, refer to Table 5.1, 'Samba4 Package Support' in the Release Notes, linked to from the References. (BZ#766333, BZ#882188) This update also fixes the following bug : * Prior to this update, if the Active Directory (AD) server was rebooted, Winbind sometimes failed to reconnect when requested by 'wbinfo -n' or 'wbinfo -s' commands. Consequently, looking up users using the wbinfo tool failed. This update applies upstream patches to fix this problem and now looking up a Security Identifier (SID) for a username, or a username for a given SID, works as expected after a domain controller is rebooted. (BZ#878564) All users of samba4 are advised to upgrade to these updated packages, which fix these issues and add these enhancements. Warning: If you upgrade from Red Hat Enterprise Linux 6.3 to Red Hat Enterprise Linux 6.4 and you have Samba in use, you should make sure that you uninstall the package named 'samba4' to avoid conflicts during the upgrade.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 68746
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68746
    title Oracle Linux 6 : samba4 (ELSA-2013-0506)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2012-0466.NASL
    description From Red Hat Security Advisory 2012:0466 : Updated samba3x packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 5.6 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is an open source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. A remote, unauthenticated attacker could send a specially crafted RPC request that would cause the Samba daemon (smbd) to crash or, possibly, execute arbitrary code with the privileges of the root user. (CVE-2012-1182) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the smb service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68507
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68507
    title Oracle Linux 5 : samba3x (ELSA-2012-0466)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_CIFS-MOUNT-8058.NASL
    description A remote code execution flaw in Samba has been fixed : - PIDL based autogenerated code uses client supplied size values which allows attackers to write beyond the allocated array size. (CVE-2012-1182)
    last seen 2019-02-21
    modified 2012-09-28
    plugin id 58765
    published 2012-04-16
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58765
    title SuSE 10 Security Update : Samba (ZYPP Patch Number 8058)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRIVA_MDVSA-2012-055.NASL
    description A vulnerability has been found and corrected in samba : The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call (CVE-2012-1182). The updated packages have been patched to correct this issue.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 58716
    published 2012-04-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58716
    title Mandriva Linux Security Advisory : samba (MDVSA-2012:055)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20120410_SAMBA_ON_SL5_X.NASL
    description Samba is an open source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. A remote, unauthenticated attacker could send a specially crafted RPC request that would cause the Samba daemon (smbd) to crash or, possibly, execute arbitrary code with the privileges of the root user. (CVE-2012-1182) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the smb service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-12-31
    plugin id 61298
    published 2012-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=61298
    title Scientific Linux Security Update : samba on SL5.x, SL6.x i386/x86_64
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2012-0465.NASL
    description Updated samba packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6; Red Hat Enterprise Linux 5.3 Long Life; and Red Hat Enterprise Linux 5.6, 6.0 and 6.1 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is an open source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. A remote, unauthenticated attacker could send a specially crafted RPC request that would cause the Samba daemon (smbd) to crash or, possibly, execute arbitrary code with the privileges of the root user. (CVE-2012-1182) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the smb service will be restarted automatically.
    last seen 2019-02-21
    modified 2018-11-26
    plugin id 58672
    published 2012-04-11
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=58672
    title RHEL 5 / 6 : samba (RHSA-2012:0465)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2013-0506.NASL
    description Updated samba4 packages that fix one security issue, multiple bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is an open source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw was found in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls. This could result in code generated by the PIDL compiler to not sufficiently protect against buffer overflows. (CVE-2012-1182) The samba4 packages have been upgraded to upstream version 4.0.0, which provides a number of bug fixes and enhancements over the previous version. In particular, improved interoperability with Active Directory (AD) domains. SSSD now uses the libndr-krb5pac library to parse the Privilege Attribute Certificate (PAC) issued by an AD Key Distribution Center (KDC). The Cross Realm Kerberos Trust functionality provided by Identity Management, which relies on the capabilities of the samba4 client library, is included as a Technology Preview. This functionality and server libraries, is included as a Technology Preview. This functionality uses the libndr-nbt library to prepare Connection-less Lightweight Directory Access Protocol (CLDAP) messages. Additionally, various improvements have been made to the Local Security Authority (LSA) and Net Logon services to allow verification of trust from a Windows system. Because the Cross Realm Kerberos Trust functionality is considered a Technology Preview, selected samba4 components are considered to be a Technology Preview. For more information on which Samba packages are considered a Technology Preview, refer to Table 5.1, 'Samba4 Package Support' in the Release Notes, linked to from the References. (BZ#766333, BZ#882188) This update also fixes the following bug : * Prior to this update, if the Active Directory (AD) server was rebooted, Winbind sometimes failed to reconnect when requested by 'wbinfo -n' or 'wbinfo -s' commands. Consequently, looking up users using the wbinfo tool failed. This update applies upstream patches to fix this problem and now looking up a Security Identifier (SID) for a username, or a username for a given SID, works as expected after a domain controller is rebooted. (BZ#878564) All users of samba4 are advised to upgrade to these updated packages, which fix these issues and add these enhancements. Warning: If you upgrade from Red Hat Enterprise Linux 6.3 to Red Hat Enterprise Linux 6.4 and you have Samba in use, you should make sure that you uninstall the package named 'samba4' to avoid conflicts during the upgrade.
    last seen 2019-02-21
    modified 2019-01-02
    plugin id 64757
    published 2013-02-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=64757
    title RHEL 6 : samba4 (RHSA-2013:0506)
  • NASL family Oracle Linux Local Security Checks
    NASL id ORACLELINUX_ELSA-2013-0515.NASL
    description From Red Hat Security Advisory 2013:0515 : Updated openchange packages that fix one security issue, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. The openchange packages provide libraries to access Microsoft Exchange servers using native protocols. Evolution-MAPI uses these libraries to integrate the Evolution PIM application with Microsoft Exchange servers. A flaw was found in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler. As OpenChange uses code generated by PIDL, this could have resulted in buffer overflows in the way OpenChange handles RPC calls. With this update, the code has been generated with an updated version of PIDL to correct this issue. (CVE-2012-1182) The openchange packages have been upgraded to upstream version 1.0, which provides a number of bug fixes and enhancements over the previous version, including support for the rebased samba4 packages and several API changes. (BZ#767672, BZ#767678) This update also fixes the following bugs : * When the user tried to modify a meeting with one required attendee and himself as the organizer, a segmentation fault occurred in the memcpy() function. Consequently, the evolution-data-server application terminated unexpectedly with a segmentation fault. This bug has been fixed and evolution-data-server no longer crashes in the described scenario. (BZ#680061) * Prior to this update, OpenChange 1.0 was unable to send messages with a large message body or with extensive attachment. This was caused by minor issues in OpenChange's exchange.idl definitions. This bug has been fixed and OpenChange now sends extensive messages without complications. (BZ#870405) All users of openchange are advised to upgrade to these updated packages, which fix these issues and add these enhancements.
    last seen 2019-02-21
    modified 2018-07-18
    plugin id 68752
    published 2013-07-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=68752
    title Oracle Linux 6 : openchange (ELSA-2013-0515)
packetstorm via4
redhat via4
advisories
  • bugzilla
    id 804093
    title CVE-2012-1182 samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output
    oval
    OR
    • AND
      • OR
        • comment Red Hat Enterprise Linux 6 Client is installed
          oval oval:com.redhat.rhsa:tst:20100842001
        • comment Red Hat Enterprise Linux 6 Server is installed
          oval oval:com.redhat.rhsa:tst:20100842002
        • comment Red Hat Enterprise Linux 6 Workstation is installed
          oval oval:com.redhat.rhsa:tst:20100842003
        • comment Red Hat Enterprise Linux 6 ComputeNode is installed
          oval oval:com.redhat.rhsa:tst:20100842004
      • OR
        • AND
          • comment libsmbclient is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465021
          • comment libsmbclient is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100860012
        • AND
          • comment libsmbclient-devel is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465011
          • comment libsmbclient-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100860022
        • AND
          • comment samba is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465005
          • comment samba is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100860006
        • AND
          • comment samba-client is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465023
          • comment samba-client is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100860014
        • AND
          • comment samba-common is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465025
          • comment samba-common is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100860016
        • AND
          • comment samba-doc is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465017
          • comment samba-doc is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100860026
        • AND
          • comment samba-domainjoin-gui is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465013
          • comment samba-domainjoin-gui is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100860024
        • AND
          • comment samba-swat is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465019
          • comment samba-swat is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100860008
        • AND
          • comment samba-winbind is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465027
          • comment samba-winbind is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100860010
        • AND
          • comment samba-winbind-clients is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465015
          • comment samba-winbind-clients is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100860020
        • AND
          • comment samba-winbind-devel is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465009
          • comment samba-winbind-devel is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20100860018
        • AND
          • comment samba-winbind-krb5-locator is earlier than 0:3.5.10-115.el6_2
            oval oval:com.redhat.rhsa:tst:20120465007
          • comment samba-winbind-krb5-locator is signed with Red Hat redhatrelease2 key
            oval oval:com.redhat.rhsa:tst:20111221018
    • AND
      • comment Red Hat Enterprise Linux 5 is installed
        oval oval:com.redhat.rhsa:tst:20070055001
      • OR
        • AND
          • comment libsmbclient is earlier than 0:3.0.33-3.39.el5_8
            oval oval:com.redhat.rhsa:tst:20120465032
          • comment libsmbclient is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20100488023
        • AND
          • comment libsmbclient-devel is earlier than 0:3.0.33-3.39.el5_8
            oval oval:com.redhat.rhsa:tst:20120465038
          • comment libsmbclient-devel is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20100488025
        • AND
          • comment samba is earlier than 0:3.0.33-3.39.el5_8
            oval oval:com.redhat.rhsa:tst:20120465030
          • comment samba is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070061003
        • AND
          • comment samba-client is earlier than 0:3.0.33-3.39.el5_8
            oval oval:com.redhat.rhsa:tst:20120465034
          • comment samba-client is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070061009
        • AND
          • comment samba-common is earlier than 0:3.0.33-3.39.el5_8
            oval oval:com.redhat.rhsa:tst:20120465040
          • comment samba-common is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070061005
        • AND
          • comment samba-swat is earlier than 0:3.0.33-3.39.el5_8
            oval oval:com.redhat.rhsa:tst:20120465036
          • comment samba-swat is signed with Red Hat redhatrelease key
            oval oval:com.redhat.rhsa:tst:20070061007
    rhsa
    id RHSA-2012:0465
    released 2012-04-10
    severity Critical
    title RHSA-2012:0465: samba security update (Critical)
  • bugzilla
    id 804093
    title CVE-2012-1182 samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output
    oval
    AND
    • comment Red Hat Enterprise Linux 5 is installed
      oval oval:com.redhat.rhsa:tst:20070055001
    • OR
      • AND
        • comment samba3x is earlier than 0:3.5.10-0.108.el5_8
          oval oval:com.redhat.rhsa:tst:20120466002
        • comment samba3x is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20100488029
      • AND
        • comment samba3x-client is earlier than 0:3.5.10-0.108.el5_8
          oval oval:com.redhat.rhsa:tst:20120466010
        • comment samba3x-client is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20100488043
      • AND
        • comment samba3x-common is earlier than 0:3.5.10-0.108.el5_8
          oval oval:com.redhat.rhsa:tst:20120466012
        • comment samba3x-common is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20100488031
      • AND
        • comment samba3x-doc is earlier than 0:3.5.10-0.108.el5_8
          oval oval:com.redhat.rhsa:tst:20120466004
        • comment samba3x-doc is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20100488035
      • AND
        • comment samba3x-domainjoin-gui is earlier than 0:3.5.10-0.108.el5_8
          oval oval:com.redhat.rhsa:tst:20120466006
        • comment samba3x-domainjoin-gui is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20100488041
      • AND
        • comment samba3x-swat is earlier than 0:3.5.10-0.108.el5_8
          oval oval:com.redhat.rhsa:tst:20120466014
        • comment samba3x-swat is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20100488045
      • AND
        • comment samba3x-winbind is earlier than 0:3.5.10-0.108.el5_8
          oval oval:com.redhat.rhsa:tst:20120466016
        • comment samba3x-winbind is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20100488053
      • AND
        • comment samba3x-winbind-devel is earlier than 0:3.5.10-0.108.el5_8
          oval oval:com.redhat.rhsa:tst:20120466008
        • comment samba3x-winbind-devel is signed with Red Hat redhatrelease key
          oval oval:com.redhat.rhsa:tst:20100488047
    rhsa
    id RHSA-2012:0466
    released 2012-04-10
    severity Critical
    title RHSA-2012:0466: samba3x security update (Critical)
  • bugzilla
    id 895718
    title Incomplete rpm provides filters causes issues with the samba4-libs package on certain architectures
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment samba4 is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506005
        • comment samba4 is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506006
      • AND
        • comment samba4-client is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506013
        • comment samba4-client is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506014
      • AND
        • comment samba4-common is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506021
        • comment samba4-common is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506022
      • AND
        • comment samba4-dc is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506019
        • comment samba4-dc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506020
      • AND
        • comment samba4-dc-libs is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506027
        • comment samba4-dc-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506028
      • AND
        • comment samba4-devel is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506025
        • comment samba4-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506026
      • AND
        • comment samba4-libs is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506009
        • comment samba4-libs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506010
      • AND
        • comment samba4-pidl is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506031
        • comment samba4-pidl is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506032
      • AND
        • comment samba4-python is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506029
        • comment samba4-python is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506030
      • AND
        • comment samba4-swat is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506015
        • comment samba4-swat is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506016
      • AND
        • comment samba4-test is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506007
        • comment samba4-test is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506008
      • AND
        • comment samba4-winbind is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506023
        • comment samba4-winbind is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506024
      • AND
        • comment samba4-winbind-clients is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506011
        • comment samba4-winbind-clients is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506012
      • AND
        • comment samba4-winbind-krb5-locator is earlier than 0:4.0.0-55.el6.rc4
          oval oval:com.redhat.rhsa:tst:20130506017
        • comment samba4-winbind-krb5-locator is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130506018
    rhsa
    id RHSA-2013:0506
    released 2013-02-21
    severity Moderate
    title RHSA-2013:0506: samba4 security, bug fix and enhancement update (Moderate)
  • bugzilla
    id 903241
    title Double-free on message copy/move
    oval
    AND
    • OR
      • comment Red Hat Enterprise Linux 6 Client is installed
        oval oval:com.redhat.rhsa:tst:20100842001
      • comment Red Hat Enterprise Linux 6 Server is installed
        oval oval:com.redhat.rhsa:tst:20100842002
      • comment Red Hat Enterprise Linux 6 Workstation is installed
        oval oval:com.redhat.rhsa:tst:20100842003
      • comment Red Hat Enterprise Linux 6 ComputeNode is installed
        oval oval:com.redhat.rhsa:tst:20100842004
    • OR
      • AND
        • comment openchange is earlier than 0:1.0-4.el6
          oval oval:com.redhat.rhsa:tst:20130515005
        • comment openchange is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130515006
      • AND
        • comment openchange-client is earlier than 0:1.0-4.el6
          oval oval:com.redhat.rhsa:tst:20130515007
        • comment openchange-client is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130515008
      • AND
        • comment openchange-devel is earlier than 0:1.0-4.el6
          oval oval:com.redhat.rhsa:tst:20130515009
        • comment openchange-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130515010
      • AND
        • comment openchange-devel-docs is earlier than 0:1.0-4.el6
          oval oval:com.redhat.rhsa:tst:20130515011
        • comment openchange-devel-docs is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130515012
      • AND
        • comment evolution-mapi is earlier than 0:0.28.3-12.el6
          oval oval:com.redhat.rhsa:tst:20130515013
        • comment evolution-mapi is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130515014
      • AND
        • comment evolution-mapi-devel is earlier than 0:0.28.3-12.el6
          oval oval:com.redhat.rhsa:tst:20130515015
        • comment evolution-mapi-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20130515016
    rhsa
    id RHSA-2013:0515
    released 2013-02-21
    severity Moderate
    title RHSA-2013:0515: openchange security, bug fix and enhancement update (Moderate)
rpms
  • libsmbclient-0:3.5.10-115.el6_2
  • libsmbclient-devel-0:3.5.10-115.el6_2
  • samba-0:3.5.10-115.el6_2
  • samba-client-0:3.5.10-115.el6_2
  • samba-common-0:3.5.10-115.el6_2
  • samba-doc-0:3.5.10-115.el6_2
  • samba-domainjoin-gui-0:3.5.10-115.el6_2
  • samba-swat-0:3.5.10-115.el6_2
  • samba-winbind-0:3.5.10-115.el6_2
  • samba-winbind-clients-0:3.5.10-115.el6_2
  • samba-winbind-devel-0:3.5.10-115.el6_2
  • samba-winbind-krb5-locator-0:3.5.10-115.el6_2
  • libsmbclient-0:3.0.33-3.39.el5_8
  • libsmbclient-devel-0:3.0.33-3.39.el5_8
  • samba-0:3.0.33-3.39.el5_8
  • samba-client-0:3.0.33-3.39.el5_8
  • samba-common-0:3.0.33-3.39.el5_8
  • samba-swat-0:3.0.33-3.39.el5_8
  • samba3x-0:3.5.10-0.108.el5_8
  • samba3x-client-0:3.5.10-0.108.el5_8
  • samba3x-common-0:3.5.10-0.108.el5_8
  • samba3x-doc-0:3.5.10-0.108.el5_8
  • samba3x-domainjoin-gui-0:3.5.10-0.108.el5_8
  • samba3x-swat-0:3.5.10-0.108.el5_8
  • samba3x-winbind-0:3.5.10-0.108.el5_8
  • samba3x-winbind-devel-0:3.5.10-0.108.el5_8
  • samba4-0:4.0.0-55.el6.rc4
  • samba4-client-0:4.0.0-55.el6.rc4
  • samba4-common-0:4.0.0-55.el6.rc4
  • samba4-dc-0:4.0.0-55.el6.rc4
  • samba4-dc-libs-0:4.0.0-55.el6.rc4
  • samba4-devel-0:4.0.0-55.el6.rc4
  • samba4-libs-0:4.0.0-55.el6.rc4
  • samba4-pidl-0:4.0.0-55.el6.rc4
  • samba4-python-0:4.0.0-55.el6.rc4
  • samba4-swat-0:4.0.0-55.el6.rc4
  • samba4-test-0:4.0.0-55.el6.rc4
  • samba4-winbind-0:4.0.0-55.el6.rc4
  • samba4-winbind-clients-0:4.0.0-55.el6.rc4
  • samba4-winbind-krb5-locator-0:4.0.0-55.el6.rc4
  • openchange-0:1.0-4.el6
  • openchange-client-0:1.0-4.el6
  • openchange-devel-0:1.0-4.el6
  • openchange-devel-docs-0:1.0-4.el6
  • evolution-mapi-0:0.28.3-12.el6
  • evolution-mapi-devel-0:0.28.3-12.el6
refmap via4
apple APPLE-SA-2012-05-09-1
confirm
debian DSA-2450
fedora
  • FEDORA-2012-5793
  • FEDORA-2012-5805
  • FEDORA-2012-5843
  • FEDORA-2012-6382
hp
  • HPSBMU02790
  • HPSBUX02789
  • SSRT100824
  • SSRT100872
mandriva MDVSA-2012:055
sectrack 1026913
secunia
  • 48751
  • 48754
  • 48816
  • 48818
  • 48844
  • 48873
  • 48879
  • 48999
suse
  • SUSE-SU-2012:0501
  • SUSE-SU-2012:0502
  • SUSE-SU-2012:0504
  • SUSE-SU-2012:0515
ubuntu USN-1423-1
Last major update 22-08-2016 - 22:05
Published 10-04-2012 - 17:55
Last modified 30-10-2018 - 12:25
Back to Top