Búsqueda de    
Vulnerabilidad   
    Buscar 211766 Descripciones CVE y
97459 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.4.2016.0905.1
Categoría:SuSE Local Security Checks
Título:SUSE: Security Advisory (SUSE-SU-2016:0905-1)
Resumen:The remote host is missing an update for the 'samba' package(s) announced via the SUSE-SU-2016:0905-1 advisory.
Descripción:Summary:
The remote host is missing an update for the 'samba' package(s) announced via the SUSE-SU-2016:0905-1 advisory.

Vulnerability Insight:
This update for samba fixes the following issues:
Security issue fixed:
- CVE-2015-7560: Getting and setting Windows ACLs on symlinks can change
permissions on link target, (bso#11648), (bsc#968222).
Bugs fixed:
- Fix leaking memory in libsmbclient: Add missing talloc stackframe,
(bso#11177), (bsc#967017).
- Ensure samlogon fallback requests are rerouted after kerberos failure,
(bsc#953382).
- Ensure attempt to ssh into locked account triggers 'Your account is
disabled.....' to the console, (bsc#953382).
- Make the winbind package depend on the matching libwbclient version and
vice versa, (bsc#936909).

Affected Software/OS:
'samba' package(s) on SUSE Linux Enterprise Server 11-SP2, SUSE Linux Enterprise Debuginfo 11-SP2

Solution:
Please install the updated package(s).

CVSS Score:
4.0

CVSS Vector:
AV:N/AC:L/Au:S/C:N/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-7560
BugTraq ID: 84267
http://www.securityfocus.com/bid/84267
Debian Security Information: DSA-3514 (Google Search)
http://www.debian.org/security/2016/dsa-3514
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html
http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html
http://www.securitytracker.com/id/1035220
SuSE Security Announcement: SUSE-SU-2016:0814 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html
SuSE Security Announcement: SUSE-SU-2016:0816 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html
SuSE Security Announcement: SUSE-SU-2016:0837 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html
SuSE Security Announcement: SUSE-SU-2016:0905 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html
SuSE Security Announcement: openSUSE-SU-2016:0813 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html
SuSE Security Announcement: openSUSE-SU-2016:0877 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html
SuSE Security Announcement: openSUSE-SU-2016:1064 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
SuSE Security Announcement: openSUSE-SU-2016:1106 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
SuSE Security Announcement: openSUSE-SU-2016:1107 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
http://www.ubuntu.com/usn/USN-2922-1
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 97459 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2021 E-Soft Inc. Todos los derechos reservados.