Search 211766 CVE descriptions
and 97459 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory (SUSE-SU-2016:1023-1)
Summary:The remote host is missing an update for the 'samba' package(s) announced via the SUSE-SU-2016:1023-1 advisory.
The remote host is missing an update for the 'samba' package(s) announced via the SUSE-SU-2016:1023-1 advisory.

Vulnerability Insight:
samba was updated to fix seven security issues.
These security issues were fixed:
- CVE-2015-5370: DCERPC server and client were vulnerable to DOS and MITM
attacks (bsc#936862).
- CVE-2016-2110: A man-in-the-middle could have downgraded NTLMSSP
authentication (bsc#973031).
- CVE-2016-2111: Domain controller netlogon member computer could have
been spoofed (bsc#973032).
- CVE-2016-2112: LDAP conenctions were vulnerable to downgrade and MITM
attack (bsc#973033).
- CVE-2016-2113: TLS certificate validation were missing (bsc#973034).
- CVE-2016-2115: Named pipe IPC were vulnerable to MITM attacks
- CVE-2016-2118: 'Badlock' DCERPC impersonation of authenticated account
were possible (bsc#971965).
These non-security issues were fixed:
- bsc#967017: Fix leaking memory in libsmbclient in cli_set_mntpoint
- Getting and setting Windows ACLs on symlinks can change permissions on

Affected Software/OS:
'samba' package(s) on SUSE OpenStack Cloud 5, SUSE Manager Proxy 2.1, SUSE Manager 2.1, SUSE Linux Enterprise Software Development Kit 11-SP4, SUSE Linux Enterprise Software Development Kit 11-SP3, SUSE Linux Enterprise Server 11-SP4, SUSE Linux Enterprise Server 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Debuginfo 11-SP3

Please install the updated package(s).

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2015-5370
Debian Security Information: DSA-3548 (Google Search)
RedHat Security Advisories: RHSA-2016:0611
RedHat Security Advisories: RHSA-2016:0612
RedHat Security Advisories: RHSA-2016:0613
RedHat Security Advisories: RHSA-2016:0614
RedHat Security Advisories: RHSA-2016:0618
RedHat Security Advisories: RHSA-2016:0619
RedHat Security Advisories: RHSA-2016:0620
RedHat Security Advisories: RHSA-2016:0624
SuSE Security Announcement: SUSE-SU-2016:1022 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:1023 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:1024 (Google Search)
SuSE Security Announcement: SUSE-SU-2016:1028 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1025 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1064 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1106 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1107 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2016-2110
RedHat Security Advisories: RHSA-2016:0621
RedHat Security Advisories: RHSA-2016:0623
RedHat Security Advisories: RHSA-2016:0625
SuSE Security Announcement: SUSE-SU-2016:1105 (Google Search)
SuSE Security Announcement: openSUSE-SU-2016:1440 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2016-2111
Common Vulnerability Exposure (CVE) ID: CVE-2016-2112
Common Vulnerability Exposure (CVE) ID: CVE-2016-2113
Common Vulnerability Exposure (CVE) ID: CVE-2016-2115
Common Vulnerability Exposure (CVE) ID: CVE-2016-2118
BugTraq ID: 86002
CERT/CC vulnerability note: VU#813296
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.