Lucene search

K

CentOS Update for samba3x CESA-2012:0533 centos5

🗓️ 30 Jul 2012 00:00:00Reported by Copyright (C) 2012 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 16 Views

The remote host is missing an update for the 'samba3x' package(s) announced via the referenced advisory. A flaw was found in the way Samba handled certain LSA Remote Procedure Calls (RPC). An authenticated user could use this flaw to issue an RPC call that would modify the privileges database on the Samba serve

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
ubuntu
Samba vulnerability
1 May 201200:00
ubuntu
securityvulns
[ MDVSA-2012:067 ] samba
10 May 201200:00
securityvulns
securityvulns
Samba privilege escalation
10 May 201200:00
securityvulns
securityvulns
HP System Management Homepage multiple security vulnerabilities
19 Jul 201300:00
securityvulns
openvas
SuSE Update for update openSUSE-SU-2012:0583-1 (update)
13 Dec 201200:00
openvas
openvas
SUSE: Security Advisory (SUSE-SU-2012:0573-1)
9 Jun 202100:00
openvas
openvas
Fedora Update for openchange FEDORA-2012-7317
30 Aug 201200:00
openvas
openvas
SUSE: Security Advisory (SUSE-SU-2012:0591-1)
9 Jun 202100:00
openvas
openvas
Fedora Update for samba FEDORA-2012-6981
30 Aug 201200:00
openvas
openvas
CentOS Update for samba3x CESA-2012:0533 centos5
30 Jul 201200:00
openvas
Rows per page
# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_xref(name:"URL", value:"http://lists.centos.org/pipermail/centos-announce/2012-April/018606.html");
  script_oid("1.3.6.1.4.1.25623.1.0.881060");
  script_version("2023-07-10T08:07:43+0000");
  script_tag(name:"last_modification", value:"2023-07-10 08:07:43 +0000 (Mon, 10 Jul 2023)");
  script_tag(name:"creation_date", value:"2012-07-30 15:59:15 +0530 (Mon, 30 Jul 2012)");
  script_cve_id("CVE-2012-2111");
  script_tag(name:"cvss_base", value:"6.5");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_xref(name:"CESA", value:"2012:0533");
  script_name("CentOS Update for samba3x CESA-2012:0533 centos5");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'samba3x'
  package(s) announced via the referenced advisory.");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_family("CentOS Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/centos", "ssh/login/rpms", re:"ssh/login/release=CentOS5");
  script_tag(name:"affected", value:"samba3x on CentOS 5");
  script_tag(name:"solution", value:"Please install the updated packages.");
  script_tag(name:"insight", value:"Samba is an open-source implementation of the Server Message Block (SMB) or
  Common Internet File System (CIFS) protocol, which allows PC-compatible
  machines to share files, printers, and other information.

  A flaw was found in the way Samba handled certain Local Security Authority
  (LSA) Remote Procedure Calls (RPC). An authenticated user could use this
  flaw to issue an RPC call that would modify the privileges database on the
  Samba server, allowing them to steal the ownership of files and directories
  that are being shared by the Samba server, and create, delete, and modify
  user accounts, as well as other Samba server administration tasks.
  (CVE-2012-2111)

  Red Hat would like to thank the Samba project for reporting this issue.
  Upstream acknowledges Ivano Cristofolini as the original reporter.

  Users of Samba are advised to upgrade to these updated packages, which
  contain a backported patch to resolve this issue. After installing this
  update, the smb service will be restarted automatically.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");
  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release)
  exit(0);

res = "";

if(release == "CentOS5")
{

  if ((res = isrpmvuln(pkg:"samba3x", rpm:"samba3x~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"samba3x-client", rpm:"samba3x-client~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"samba3x-common", rpm:"samba3x-common~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"samba3x-doc", rpm:"samba3x-doc~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"samba3x-domainjoin-gui", rpm:"samba3x-domainjoin-gui~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"samba3x-swat", rpm:"samba3x-swat~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"samba3x-winbind", rpm:"samba3x-winbind~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"samba3x-winbind-devel", rpm:"samba3x-winbind-devel~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99);
  exit(0);
}

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
30 Jul 2012 00:00Current
6.5Medium risk
Vulners AI Score6.5
CVSS26.5
EPSS0.006
16
.json
Report