Lucene search

K
nessusThis script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.SUSE_11_1_CIFS-MOUNT-100613.NASL
HistoryJul 01, 2010 - 12:00 a.m.

openSUSE Security Update : cifs-mount (openSUSE-SU-2010:0346-1)

2010-07-0100:00:00
This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
20

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.972

Percentile

99.9%

This update of the Samba server package fixes security issues and bugs.

Following security issues were fixed: CVE-2010-2063: A buffer overrun was possible in chain_reply code in 3.3.x and below, which could be used to crash the samba server or potentially execute code.

CVE-2010-0787: Take extra care that a mount point of mount.cifs isnโ€™t changed during mount.

Also the following bugs were fixed :

  • Honor โ€˜interfacesโ€™ list in net ad dns register.
    (bnc#606947)

  • An uninitialized variable read could cause an smbd crash; (bso#7254); (bnc#605935).

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from openSUSE Security Update cifs-mount-2543.
#
# The text description of this plugin is (C) SUSE LLC.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(47572);
  script_version("1.10");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");

  script_cve_id("CVE-2010-0787", "CVE-2010-2063");

  script_name(english:"openSUSE Security Update : cifs-mount (openSUSE-SU-2010:0346-1)");
  script_summary(english:"Check for the cifs-mount-2543 patch");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote openSUSE host is missing a security update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"This update of the Samba server package fixes security issues and
bugs.

Following security issues were fixed: CVE-2010-2063: A buffer overrun
was possible in chain_reply code in 3.3.x and below, which could be
used to crash the samba server or potentially execute code.

CVE-2010-0787: Take extra care that a mount point of mount.cifs isn't
changed during mount.

Also the following bugs were fixed :

  - Honor 'interfaces' list in net ad dns register.
    (bnc#606947)

  - An uninitialized variable read could cause an smbd
    crash; (bso#7254); (bnc#605935)."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=550002"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=577868"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=605935"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=606947"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://bugzilla.novell.com/show_bug.cgi?id=611927"
  );
  script_set_attribute(
    attribute:"see_also",
    value:"https://lists.opensuse.org/opensuse-updates/2010-06/msg00011.html"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Update the affected cifs-mount packages."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"true");
  script_set_attribute(attribute:"metasploit_name", value:'Samba chain_reply Memory Corruption (Linux x86)');
  script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
  script_cwe_id(59);

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:cifs-mount");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:ldapsmb");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libnetapi-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libnetapi0");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsmbclient-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsmbclient0");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsmbclient0-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsmbsharemodes-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libsmbsharemodes0");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtalloc-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtalloc1");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtalloc1-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtdb-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtdb1");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libtdb1-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwbclient-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwbclient0");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:libwbclient0-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:samba");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:samba-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:samba-client");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:samba-client-32bit");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:samba-devel");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:samba-krb-printing");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:samba-vscan");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:samba-winbind");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:samba-winbind-32bit");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:11.1");

  script_set_attribute(attribute:"patch_publication_date", value:"2010/06/13");
  script_set_attribute(attribute:"plugin_publication_date", value:"2010/07/01");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2010-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english:"SuSE Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu");

  exit(0);
}


include("audit.inc");
include("global_settings.inc");
include("rpm.inc");

if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE");
if (release !~ "^(SUSE11\.1)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "11.1", release);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);

ourarch = get_kb_item("Host/cpu");
if (!ourarch) audit(AUDIT_UNKNOWN_ARCH);
if (ourarch !~ "^(i586|i686|x86_64)$") audit(AUDIT_ARCH_NOT, "i586 / i686 / x86_64", ourarch);

flag = 0;

if ( rpm_check(release:"SUSE11.1", reference:"cifs-mount-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"ldapsmb-1.34b-6.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libnetapi-devel-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libnetapi0-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libsmbclient-devel-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libsmbclient0-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libsmbsharemodes-devel-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libsmbsharemodes0-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libtalloc-devel-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libtalloc1-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libtdb-devel-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libtdb1-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libwbclient-devel-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"libwbclient0-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"samba-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"samba-client-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"samba-devel-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"samba-krb-printing-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"samba-vscan-0.3.6b-6.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", reference:"samba-winbind-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", cpu:"x86_64", reference:"libsmbclient0-32bit-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", cpu:"x86_64", reference:"libtalloc1-32bit-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", cpu:"x86_64", reference:"libtdb1-32bit-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", cpu:"x86_64", reference:"libwbclient0-32bit-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", cpu:"x86_64", reference:"samba-32bit-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", cpu:"x86_64", reference:"samba-client-32bit-3.2.7-11.7.1") ) flag++;
if ( rpm_check(release:"SUSE11.1", cpu:"x86_64", reference:"samba-winbind-32bit-3.2.7-11.7.1") ) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
  else security_hole(0);
  exit(0);
}
else
{
  tested = pkg_tests_get();
  if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
  else audit(AUDIT_PACKAGE_NOT_INSTALLED, "samba");
}

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

EPSS

0.972

Percentile

99.9%