Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.850551 |
Kategorie: | SuSE Local Security Checks |
Titel: | openSUSE: Security Advisory for update (openSUSE-SU-2013:1349-1) |
Zusammenfassung: | The remote host is missing an update for the 'update'; package(s) announced via the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'update' package(s) announced via the referenced advisory. Vulnerability Insight: This update of samba fixed the following issues: - The pam_winbind require_membership_of option allows for a list of SID, but currently only provides buffer space for ~ 20 (bnc#806501). - Samba 3.0.x to 4.0.7 are affected by a denial of service attack on authenticated or guest connections CVE-2013-4124 (bnc#829969). - PIDL: fix parsing linemarkers in preprocessor output (bso#9636). - build:autoconf: fix output of syslog-facility check (bso#9983). - libreplace: add a missing 'eval' to the AC_VERIFY_C_PROTOTYPE macro. - Remove ldapsmb from the main spec file. - Don't bzip2 the main tar ball, use the upstream gzipped one instead. - Fix crash bug during Win8 sync (bso#9822). - Check for system libtevent and link dbwrap_tool and dbwrap_torture against it (bso#9881). - errno gets overwritten in call to check_parent_exists() (bso#9927). - Fix a bug of drvupgrade of smbcontrol (bso#9941). - Document idmap_ad rfc2307 attribute requirements (bso#9880) (bnc#820531). - Don't package the SWAT man page while its build is disabled (bnc#816647). - Don't install the tdb utilities man pages on post-12.1 systems (bnc#823549). - Fix libreplace license ambiguity (bso#8997) (bnc#765270). - s3-docs: Remove 'experimental' label on 'max protocol=SMB2' parameter (bso#9688). - Remove the compound_related_in_progress state from the smb2 global state (bso#9722). - Makefile: Don't know how to make LIBNDR_PREG_OBJ (bso#9868). - Fix is_printer_published GUID retrieval (bso#9900) (bnc#798856). - Fix 'map untrusted to domain' with NTLMv2 (bso#9817) (bnc#817919). - Don't modify the pidfile name when a custom config file path is used (bnc#812929). - Add extra attributes for AD printer publishing (bso#9378) (bnc#798856). - Fix vfs_catia module (bso#9701) (bnc#824833). systems (bnc#804822) (bnc#821889). - Fix AD printer publishing (bso#9378) (bnc#798856). Affected Software/OS: update on openSUSE 12.3 Solution: Please install the updated package(s). CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-4124 Bugtraq: 20130806 [slackware-security] samba (SSA:2013-218-03) (Google Search) http://archives.neohapsis.com/archives/bugtraq/2013-08/0028.html http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113591.html http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114011.html http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html http://security.gentoo.org/glsa/glsa-201502-15.xml HPdes Security Advisory: HPSBUX03087 http://marc.info/?l=bugtraq&m=141660010015249&w=2 HPdes Security Advisory: SSRT101413 http://www.mandriva.com/security/advisories?name=MDVSA-2013:207 http://osvdb.org/95969 RedHat Security Advisories: RHSA-2013:1310 http://rhn.redhat.com/errata/RHSA-2013-1310.html RedHat Security Advisories: RHSA-2013:1542 http://rhn.redhat.com/errata/RHSA-2013-1542.html RedHat Security Advisories: RHSA-2013:1543 http://rhn.redhat.com/errata/RHSA-2013-1543.html RedHat Security Advisories: RHSA-2014:0305 http://rhn.redhat.com/errata/RHSA-2014-0305.html http://www.securitytracker.com/id/1028882 http://secunia.com/advisories/54519 SuSE Security Announcement: openSUSE-SU-2013:1339 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.html SuSE Security Announcement: openSUSE-SU-2013:1349 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.html http://www.ubuntu.com/usn/USN-1966-1 XForce ISS Database: samba-cve20134121-dos(86185) https://exchange.xforce.ibmcloud.com/vulnerabilities/86185 |
Copyright | Copyright (C) 2013 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |