Búsqueda de    
    Buscar 211766 Descripciones CVE y
97459 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:
Categoría:SuSE Local Security Checks
Título:SUSE: Security Advisory (SUSE-SU-2020:1948-1)
Resumen:The remote host is missing an update for the 'ldb, samba' package(s) announced via the SUSE-SU-2020:1948-1 advisory.
The remote host is missing an update for the 'ldb, samba' package(s) announced via the SUSE-SU-2020:1948-1 advisory.

Vulnerability Insight:
This update for ldb, samba fixes the following issues:

Changes in samba:
Update to samba 4.11.11
+ CVE-2020-10730: NULL de-reference in AD DC LDAP server when ASQ and
VLV combined, (bso#14364), (bsc#1173159]
+ CVE-2020-10745: invalid DNS or NBT queries containing dots use several
seconds of CPU each, (bso#14378), (bsc#1173160).
+ CVE-2020-10760: Use-after-free in AD DC Global Catalog LDAP server
with paged_result or VLV, (bso#14402), (bsc#1173161)
+ CVE-2020-14303: Endless loop from empty UDP packet sent to AD DC
nbt_server, (bso#14417), (bsc#1173359).

Update to samba 4.11.10
+ Fix segfault when using SMBC_opendir_ctx() routine for share folder
that contains incorrect symbols in any file name, (bso#14374).
+ vfs_shadow_copy2 doesn't fail case looking in snapdirseverywhere mode,
+ ldb_ldap: Fix off-by-one increment in lldb_add_msg_attr, (bso#14413).
+ Malicous SMB1 server can crash libsmbclient, (bso#14366)
+ winbindd: Fix a use-after-free when winbind clients exit, (bso#14382)
+ ldb: Bump version to 2.0.11, LMDB databases can grow without bounds.

Update to samba 4.11.9
+ nmblib: Avoid undefined behaviour in handle_name_ptrs(), (bso#14242).
+ 'samba-tool group' commands do not handle group names with special
chars correctly, (bso#14296).
+ smbd: avoid calling vfs_file_id_from_sbuf() if statinfo is not valid,
+ Missing check for DMAPI offline status in async DOS attributes,
+ smbd: Ignore set NTACL requests which contain S-1-5-88 NFS ACEs,
+ vfs_recycle: Prevent flooding the log if we're called on non-existant
paths, (bso#14316)
+ smbd mistakenly updates a file's write-time on close, (bso#14320).
+ RPC handles cannot be differentiated in source3 RPC server,
+ librpc: Fix IDL for svcctl_ChangeServiceConfigW, (bso#14313).
+ nsswitch: Fix use-after-free causing segfault in _pam_delete_cred,
+ Fix fruit:time machine max size on arm, (bso#13622)
+ CTDB recovery corner cases can cause record resurrection and node
banning, (bso#14294).
+ ctdb: Fix a memleak, (bso#14348).
+ libsmb: Don't try to find posix stat info in SMBC_getatr().
+ ctdb-tcp: Move free of inbound queue to TCP restart, (bso#14295),
+ s3/librpc/crypto: Fix double free with unresolved credential cache,
(bso#14344), (bsc#1169095)
+ s3:libads: Fix ads_get_upn(), (bso#14336).
+ CTDB recovery corner cases can cause record resurrection and node
banning, (bso#14294)
+ Starting ctdb node that was powered off hard before results in
recovery loop, (bso#14295), (bsc#1162680).
+ ctdb-recoverd: Avoid dereferencing NULL rec->nodemap, (bso#14324)

Update to samba 4.11.8
+ CVE-2020-10700: Use-after-free in Samba AD DC LDAP Server with ASQ,
(bso#14331), (bsc#1169850),
+ CVE-2020-10704: LDAP Denial of Service (stack overflow) in Samba AD
DC, (bso#14334), (bsc#1169851),

Update... [Please see the references for more information on the vulnerabilities]

Affected Software/OS:
'ldb, samba' package(s) on SUSE Linux Enterprise Module for Python2 15-SP2, SUSE Linux Enterprise Module for Basesystem 15-SP2, SUSE Linux Enterprise High Availability 15-SP2

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2020-10700
Common Vulnerability Exposure (CVE) ID: CVE-2020-10704
Common Vulnerability Exposure (CVE) ID: CVE-2020-10730
Common Vulnerability Exposure (CVE) ID: CVE-2020-10745
Common Vulnerability Exposure (CVE) ID: CVE-2020-10760
Common Vulnerability Exposure (CVE) ID: CVE-2020-14303
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 97459 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.

© 1998-2021 E-Soft Inc. Todos los derechos reservados.