Lucene search

K
suseSuseSUSE-SU-2012:0348-1
HistoryMar 09, 2012 - 5:08 p.m.

Security update for Samba (critical)

2012-03-0917:08:16
lists.opensuse.org
24

0.973 High

EPSS

Percentile

99.8%

This Samba file server update fixes various security issues:

  • CVE-2012-0870: A heap-based buffer overflow that
    could be exploited by remote, unauthenticated attackers to
    crash the smbd daemon or potentially execute arbitrary code
    via specially crafted SMB AndX request packets.
  • CVE-2011-2694: A cross site scripting problem in SWAT
    was fixed.
  • CVE-2011-0719: Fixed a possible denial of service
    caused by memory corruption.
  • CVE-2010-3069: Fix buffer overflow in sid_parse() to
    correctly check the input lengths when reading a binary
    representation of a Windows Security ID (SID).
  • CVE-2010-2063: Addressed possible buffer overrun in
    chain_reply code of pre-3.4 versions.
  • CVE-2010-1642: An uninitialized variable read could
    have caused an smbd crash.
  • CVE-2010-0787: Take extra care that a mount point of
    mount.cifs isn’t changed during mount;

Also the following bugs have been fixed:

  • Add Provides samba-client-gplv2 and samba-doc-gplv2
    to pre-3.2 versions; (bnc#652620).
  • Initialize workgroup of nmblookup as empty string.
  • Fix trusts with Windows 2008R2 DCs; (bnc#613459);
    (bnc#599873); (bnc#592198); (bso#6697).
  • Document "wide links" defaults to "no" in the
    smb.conf man page for versions pre-3.4.6; (bnc#577868).
  • Allow forced pw change even with min pw age;
    (bnc#561894).