The remote host is missing an update for the 'samba3x' package(s) announced via the referenced advisory. A flaw was found in the way Samba handled certain LSA Remote Procedure Calls (RPC). An authenticated user could use this flaw to issue an RPC call that would modify the privileges database on the Samba serve
Reporter | Title | Published | Views | Family All 91 |
---|---|---|---|---|
![]() | Samba vulnerability | 1 May 201200:00 | – | ubuntu |
![]() | [ MDVSA-2012:067 ] samba | 10 May 201200:00 | – | securityvulns |
![]() | Samba privilege escalation | 10 May 201200:00 | – | securityvulns |
![]() | HP System Management Homepage multiple security vulnerabilities | 19 Jul 201300:00 | – | securityvulns |
![]() | SuSE Update for update openSUSE-SU-2012:0583-1 (update) | 13 Dec 201200:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2012:0573-1) | 9 Jun 202100:00 | – | openvas |
![]() | Fedora Update for openchange FEDORA-2012-7317 | 30 Aug 201200:00 | – | openvas |
![]() | SUSE: Security Advisory (SUSE-SU-2012:0591-1) | 9 Jun 202100:00 | – | openvas |
![]() | Fedora Update for samba FEDORA-2012-6981 | 30 Aug 201200:00 | – | openvas |
![]() | CentOS Update for samba3x CESA-2012:0533 centos5 | 30 Jul 201200:00 | – | openvas |
# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_xref(name:"URL", value:"http://lists.centos.org/pipermail/centos-announce/2012-April/018606.html");
script_oid("1.3.6.1.4.1.25623.1.0.881060");
script_version("2023-07-10T08:07:43+0000");
script_tag(name:"last_modification", value:"2023-07-10 08:07:43 +0000 (Mon, 10 Jul 2023)");
script_tag(name:"creation_date", value:"2012-07-30 15:59:15 +0530 (Mon, 30 Jul 2012)");
script_cve_id("CVE-2012-2111");
script_tag(name:"cvss_base", value:"6.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:P/I:P/A:P");
script_xref(name:"CESA", value:"2012:0533");
script_name("CentOS Update for samba3x CESA-2012:0533 centos5");
script_tag(name:"summary", value:"The remote host is missing an update for the 'samba3x'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2012 Greenbone AG");
script_family("CentOS Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/centos", "ssh/login/rpms", re:"ssh/login/release=CentOS5");
script_tag(name:"affected", value:"samba3x on CentOS 5");
script_tag(name:"solution", value:"Please install the updated packages.");
script_tag(name:"insight", value:"Samba is an open-source implementation of the Server Message Block (SMB) or
Common Internet File System (CIFS) protocol, which allows PC-compatible
machines to share files, printers, and other information.
A flaw was found in the way Samba handled certain Local Security Authority
(LSA) Remote Procedure Calls (RPC). An authenticated user could use this
flaw to issue an RPC call that would modify the privileges database on the
Samba server, allowing them to steal the ownership of files and directories
that are being shared by the Samba server, and create, delete, and modify
user accounts, as well as other Samba server administration tasks.
(CVE-2012-2111)
Red Hat would like to thank the Samba project for reporting this issue.
Upstream acknowledges Ivano Cristofolini as the original reporter.
Users of Samba are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing this
update, the smb service will be restarted automatically.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "CentOS5")
{
if ((res = isrpmvuln(pkg:"samba3x", rpm:"samba3x~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba3x-client", rpm:"samba3x-client~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba3x-common", rpm:"samba3x-common~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba3x-doc", rpm:"samba3x-doc~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba3x-domainjoin-gui", rpm:"samba3x-domainjoin-gui~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba3x-swat", rpm:"samba3x-swat~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba3x-winbind", rpm:"samba3x-winbind~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"samba3x-winbind-devel", rpm:"samba3x-winbind-devel~3.5.10~0.109.el5_8", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo