Vulnerabilities > CVE-2010-3069 - Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

Vulnerable Configurations

Part Description Count
Application
Samba
133
OS
Canonical
5

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Overflow Buffers
    Buffer Overflow attacks target improper or missing bounds checking on buffer operations, typically triggered by input injected by an attacker. As a consequence, an attacker is able to write past the boundaries of allocated buffer regions in memory, causing a program crash or potentially redirection of execution as per the attackers' choice.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.

Nessus

  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_CIFS-MOUNT-100914.NASL
    descriptionA buffer overflow in the sid_parse() function of samba could potentially be exploited by remote attackers to execute arbitrary code. (CVE-2010-3069) Additionally the update also contains fixes for the following non-security issues : - Failed to join ADS Domain. (bnc#567013) - Samba 3.0 / 3.2 doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id50895
    published2010-12-02
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/50895
    titleSuSE 11 / 11.1 Security Update : Samba (SAT Patch Numbers 3099 / 3100)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from SuSE 11 update information. The text itself is
    # copyright (C) Novell, Inc.
    #
    
    if (NASL_LEVEL < 3000) exit(0);
    
    include("compat.inc");
    
    if (description)
    {
      script_id(50895);
      script_version("1.8");
      script_cvs_date("Date: 2019/10/25 13:36:39");
    
      script_cve_id("CVE-2010-3069");
    
      script_name(english:"SuSE 11 / 11.1 Security Update : Samba (SAT Patch Numbers 3099 / 3100)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote SuSE 11 host is missing one or more security updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "A buffer overflow in the sid_parse() function of samba could
    potentially be exploited by remote attackers to execute arbitrary
    code. (CVE-2010-3069)
    
    Additionally the update also contains fixes for the following
    non-security issues :
    
      - Failed to join ADS Domain. (bnc#567013)
    
      - Samba 3.0 / 3.2 doesn't work with Windows 2008 R2
        (NTLMv2). (bnc#592198)
    
      - SAMBA - Problem using NTLM authentication with 2008R2.
        (bnc#599873)
    
      - winbindd crashes in rpcclisettimeout. (bnc#613459)
    
      - new printers are not seen in samba with registry.
        (bnc#617153)"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=567013"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=573246"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=583535"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=592198"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=599873"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=613459"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=617153"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=630812"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=632055"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=632852"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://bugzilla.novell.com/show_bug.cgi?id=637218"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://support.novell.com/security/cve/CVE-2010-3069.html"
      );
      script_set_attribute(
        attribute:"solution", 
        value:"Apply SAT patch number 3099 / 3100 as appropriate."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:cifs-mount");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:ldapsmb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libsmbclient0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libsmbclient0-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libtalloc1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libtalloc1-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libtdb1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libtdb1-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libwbclient0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:libwbclient0-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:samba");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:samba-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:samba-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:samba-client-32bit");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:samba-krb-printing");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:samba-vscan");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:samba-winbind");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:11:samba-winbind-32bit");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:11");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2010/09/14");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/12/02");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2010-2019 Tenable Network Security, Inc.");
      script_family(english:"SuSE Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/SuSE/release");
    if (isnull(release) || release !~ "^(SLED|SLES)11") audit(AUDIT_OS_NOT, "SuSE 11");
    if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SuSE 11", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"cifs-mount-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"libsmbclient0-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"libtalloc1-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"libtdb1-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"libwbclient0-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"samba-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"samba-client-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"samba-krb-printing-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"samba-vscan-0.3.6b-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"i586", reference:"samba-winbind-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"cifs-mount-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"libsmbclient0-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"libsmbclient0-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"libtalloc1-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"libtalloc1-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"libtdb1-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"libtdb1-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"libwbclient0-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"libwbclient0-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"samba-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"samba-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"samba-client-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"samba-client-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"samba-krb-printing-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"samba-vscan-0.3.6b-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"samba-winbind-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:0, cpu:"x86_64", reference:"samba-winbind-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"cifs-mount-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"libsmbclient0-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"libtalloc1-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"libtdb1-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"libwbclient0-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"samba-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"samba-client-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"samba-krb-printing-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"i586", reference:"samba-winbind-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"cifs-mount-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"libsmbclient0-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"libsmbclient0-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"libtalloc1-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"libtalloc1-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"libtdb1-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"libtdb1-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"libwbclient0-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"libwbclient0-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"samba-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"samba-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"samba-client-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"samba-client-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"samba-krb-printing-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"samba-winbind-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLED11", sp:1, cpu:"x86_64", reference:"samba-winbind-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"cifs-mount-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"ldapsmb-1.34b-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"libsmbclient0-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"libtalloc1-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"libtdb1-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"libwbclient0-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"samba-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"samba-client-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"samba-krb-printing-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, reference:"samba-winbind-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"s390x", reference:"libsmbclient0-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"s390x", reference:"libtalloc1-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"s390x", reference:"libtdb1-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"s390x", reference:"libwbclient0-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"s390x", reference:"samba-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"s390x", reference:"samba-client-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"s390x", reference:"samba-winbind-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"libsmbclient0-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"libtalloc1-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"libtdb1-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"libwbclient0-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"samba-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"samba-client-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:0, cpu:"x86_64", reference:"samba-winbind-32bit-3.2.7-11.21.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, reference:"cifs-mount-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, reference:"ldapsmb-1.34b-11.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, reference:"libsmbclient0-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, reference:"libtalloc1-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, reference:"libtdb1-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, reference:"libwbclient0-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, reference:"samba-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, reference:"samba-client-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, reference:"samba-krb-printing-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, reference:"samba-winbind-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"s390x", reference:"libsmbclient0-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"s390x", reference:"libtalloc1-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"s390x", reference:"libtdb1-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"s390x", reference:"libwbclient0-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"s390x", reference:"samba-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"s390x", reference:"samba-client-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"s390x", reference:"samba-winbind-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"libsmbclient0-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"libtalloc1-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"libtdb1-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"libwbclient0-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"samba-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"samba-client-32bit-3.4.3-1.19.1")) flag++;
    if (rpm_check(release:"SLES11", sp:1, cpu:"x86_64", reference:"samba-winbind-32bit-3.4.3-1.19.1")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familySlackware Local Security Checks
    NASL idSLACKWARE_SSA_2010-257-01.NASL
    descriptionNew samba packages are available for Slackware 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, and -current to fix a security issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id49229
    published2010-09-15
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/49229
    titleSlackware 10.0 / 10.1 / 10.2 / 11.0 / 12.0 / 12.1 / 12.2 / 13.0 / 13.1 / current : samba (SSA:2010-257-01)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_CIFS-MOUNT-7151.NASL
    descriptionA buffer overflow in the sid_parse() function of samba could potentially be exploited by remote attackers to execute arbitrary code. (CVE-2010-3069) Additionally the update also contains fixes for the following non-security issues : - Failed to join ADS Domain. (bnc#567013) - Samba 3.0 / 3.2 doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id49836
    published2010-10-11
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/49836
    titleSuSE 10 Security Update : Samba (ZYPP Patch Number 7151)
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_SECUPD2011-004.NASL
    descriptionThe remote host is running a version of Mac OS X 10.5 that does not have Security Update 2011-004 applied. This update contains security- related fixes for the following components : - AirPort - App Store - ColorSync - CoreGraphics - ImageIO - Libsystem - libxslt - MySQL - patch - Samba - servermgrd - subversion
    last seen2020-06-01
    modified2020-06-02
    plugin id55415
    published2011-06-24
    reporterThis script is Copyright (C) 2011-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55415
    titleMac OS X Multiple Vulnerabilities (Security Update 2011-004)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_2_CIFS-MOUNT-100915.NASL
    descriptionA buffer overflow in the sid_parse() function of samba could potentially be exploited by remote attackers to execute arbitrary code (CVE-2010-3069). Additionally the update also contains fixes for the following non-security issues: bnc#573246 - mounted shares via mount.cifs disappear when dhclient renews lease bnc#617153 - new printers are not seen in samba with registry bnc#630812 - net ads join failing due to malformed UPN bnc#632055 - No authentication dialog to access SMB share through Nautilus bnc#632852 - root preexec does not work as expected
    last seen2020-06-01
    modified2020-06-02
    plugin id49670
    published2010-09-24
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/49670
    titleopenSUSE Security Update : cifs-mount (openSUSE-SU-2010:0659-1)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_1_CIFS-MOUNT-100914.NASL
    descriptionA buffer overflow in the sid_parse() function of samba could potentially be exploited by remote attackers to execute arbitrary code (CVE-2010-3069). Additionally the update also contains fixes for the following non-security issues: bnc#567013 - Failed to join ADS Domain bnc#592198 - Samba 3.0 / 3.2 doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id49667
    published2010-09-24
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/49667
    titleopenSUSE Security Update : cifs-mount (openSUSE-SU-2010:0658-1)
  • NASL familyMisc.
    NASL idSAMBA_3_5_5.NASL
    descriptionAccording to its banner, the version of Samba 3.x running on the remote host is earlier than 3.5.5. The
    last seen2020-06-01
    modified2020-06-02
    plugin id49228
    published2010-09-15
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/49228
    titleSamba 3.x < 3.5.5 / 3.4.9 / 3.3.14 sid_parse Buffer Overflow
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2010-184.NASL
    descriptionA vulnerability has been found and corrected in samba : Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share (CVE-2010-3069). The updated packages have been patched to correct this issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id49263
    published2010-09-17
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/49263
    titleMandriva Linux Security Advisory : samba (MDVSA-2010:184)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20100914_SAMBA3X_ON_SL5_X.NASL
    descriptionNOTE: This errata went out 2010-09-15, but this email was not sent. A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) After installing this update, the smb service will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id60856
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60856
    titleScientific Linux Security Update : samba3x on SL5.x i386/x86_64
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2010-0860.NASL
    descriptionFrom Red Hat Security Advisory 2010:0860 : Updated samba packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) Users of Samba are advised to upgrade to these updated packages, which correct this issue. After installing this update, the smb service will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id68138
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68138
    titleOracle Linux 6 : samba (ELSA-2010-0860)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2010-0860.NASL
    descriptionUpdated samba packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) Users of Samba are advised to upgrade to these updated packages, which correct this issue. After installing this update, the smb service will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id50632
    published2010-11-18
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/50632
    titleRHEL 6 : samba (RHSA-2010:0860)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2010-0697.NASL
    descriptionUpdated samba packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 3, 4, and 5, and Red Hat Enterprise Linux 4.7, 5.3, and 5.4 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) For Red Hat Enterprise Linux 4, this update also fixes the following bug : * Previously, the restorecon utility was required during the installation of the samba-common package. As a result, attempting to update samba without this utility installed may have failed with the following error : /var/tmp/rpm-tmp.[xxxxx]: line 7: restorecon: command not found With this update, the utility is only used when it is already present on the system, and the package is now always updated as expected. (BZ#629602) Users of Samba are advised to upgrade to these updated packages, which correct these issues. After installing this update, the smb service will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id49261
    published2010-09-17
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/49261
    titleCentOS 3 / 4 / 5 : samba (CESA-2010:0697)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2010-0697.NASL
    descriptionUpdated samba packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 3, 4, and 5, and Red Hat Enterprise Linux 4.7, 5.3, and 5.4 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) For Red Hat Enterprise Linux 4, this update also fixes the following bug : * Previously, the restorecon utility was required during the installation of the samba-common package. As a result, attempting to update samba without this utility installed may have failed with the following error : /var/tmp/rpm-tmp.[xxxxx]: line 7: restorecon: command not found With this update, the utility is only used when it is already present on the system, and the package is now always updated as expected. (BZ#629602) Users of Samba are advised to upgrade to these updated packages, which correct these issues. After installing this update, the smb service will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id49232
    published2010-09-15
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/49232
    titleRHEL 3 / 4 / 5 : samba (RHSA-2010:0697)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-14627.NASL
    description---------------------------------------------------------------------- ---------- ChangeLog : - Thu Sep 9 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.5-68 - Security Release, fixes CVE-2010-3069 - resolves: #630869 - Thu Aug 26 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-67 - Put winbind krb5 locator plugin into a separate rpm - resolves: #627181 - Tue Aug 24 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-66 - More fixes for winbind schannel - Thu Aug 19 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-65 - Fix winbind default domain - related: #618201 - Wed Aug 18 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-64 - Fix offline authentication - resolves: #618201 - Tue Aug 10 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-63 - Fix winbind secure channel (samlogonex) - Wed Jun 23 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-62 - Update to 3.5.4 - Wed May 19 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.3-61 - Update to 3.5.3 - Make sure nmb and smb initscripts return LSB compliant return codes - Fix winbind over ipv6 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id49247
    published2010-09-16
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/49247
    titleFedora 13 : samba-3.5.5-68.fc13 (2010-14627)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_146363-01.NASL
    descriptionSunOS 5.10: Samba patch. Date this patch was last updated by Sun : Jan/04/11
    last seen2020-06-01
    modified2020-06-02
    plugin id107590
    published2018-03-12
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/107590
    titleSolaris 10 (sparc) : 146363-01
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2010-0698.NASL
    descriptionFrom Red Hat Security Advisory 2010:0698 : Updated samba3x packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the smb service will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id68101
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68101
    titleOracle Linux 5 : samba3x (ELSA-2010-0698)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_3_LDAPSMB-100915.NASL
    descriptionA buffer overflow in the sid_parse() function of samba could potentially be exploited by remote attackers to execute arbitrary code (CVE-2010-3069). Additionally the update also contains fixes for the following non-security issues : bnc#567013 - Failed to join ADS Domain bnc#573246 - mounted shares via mount.cifs disappear when dhclient renews lease bnc#592198 - Samba 3.0 / 3.2 doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id75568
    published2014-06-13
    reporterThis script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/75568
    titleopenSUSE Security Update : ldapsmb (openSUSE-SU-2010:0653-1)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20100914_SAMBA_ON_SL3_X.NASL
    descriptionNOTE: This errata went out 2010-09-15, but this email was not sent. A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) For Scientific Linux 4, this update also fixes the following bug : - Previously, the restorecon utility was required during the installationof the samba-common package. As a result, attempting to update sambawithout this utility installed may have failed with the following error : /var/tmp/rpm-tmp.[xxxxx]: line 7: restorecon: command not found With this update, the utility is only used when it is already present on the system, and the package is now always updated as expected. (BZ#629602) After installing this update, the smb service will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id60857
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60857
    titleScientific Linux Security Update : samba on SL3.x, SL4.x, SL5.x i386/x86_64
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2109.NASL
    descriptionA vulnerability has been discovered in samba, a SMB/CIFS file, print, and login server for Unix. The sid_parse() function does not correctly check its input lengths when reading a binary representation of a Windows SID (Security ID). This allows a malicious client to send a sid that can overflow the stack variable that is being used to store the SID in the Samba smbd server. (CVE-2010-3069 )
    last seen2020-06-01
    modified2020-06-02
    plugin id49275
    published2010-09-20
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/49275
    titleDebian DSA-2109-1 : samba - buffer overflow
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2010-0019.NASL
    descriptiona. Service Console update for samba The service console package samba is updated to version 3.0.9-1.3E.18. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-3069 to this issue. b. Service Console update for bzip2 The service console package bzip2 is updated to version 1.0.2-14.EL3 in ESX 3.x and version 1.0.3-6 in ESX 4.x. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2010-0405 to this issue. c. Service Console update for OpenSSL The service console package openssl updated to version 0.9.7a-33.26. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-0590, CVE-2009-2409 and CVE-2009-3555 to the issues addressed in this update.
    last seen2020-06-01
    modified2020-06-02
    plugin id51077
    published2010-12-08
    reporterThis script is Copyright (C) 2010-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/51077
    titleVMSA-2010-0019 : VMware ESX third-party updates for Service Console
  • NASL familyMacOS X Local Security Checks
    NASL idMACOSX_10_6_7.NASL
    descriptionThe remote host is running a version of Mac OS X 10.6.x that is prior to 10.6.7. Mac OS X 10.6.7 contains security fixes for the following products : - AirPort - Apache - AppleScript - ATS - bzip2 - CarbonCore - ClamAV - CoreText - File Quarantine - HFS - ImageIO - Image RAW - Installer - Kerberos - Kernel - Libinfo - libxml - Mailman - PHP - QuickLook - QuickTime - Ruby - Samba - Subversion - Terminal - X11
    last seen2020-06-01
    modified2020-06-02
    plugin id52754
    published2011-03-22
    reporterThis script is Copyright (C) 2011-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/52754
    titleMac OS X 10.6.x < 10.6.7 Multiple Vulnerabilities
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201206-22.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201206-22 (Samba: Multiple vulnerabilities) Multiple vulnerabilities have been discovered in Samba. Please review the CVE identifiers referenced below for details. Impact : A remote attacker could possibly execute arbitrary code with root privileges, cause a Denial of Service condition, take ownership of shared files, or bypass file permissions. Furthermore, a local attacker may be able to cause a Denial of Service condition or obtain sensitive information in a Samba credentials file. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id59675
    published2012-06-25
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59675
    titleGLSA-201206-22 : Samba: Multiple vulnerabilities
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-3120.NASL
    description - Tue Mar 8 2011 Guenther Deschner <gdeschner at redhat.com> - 3.5.8-74 - Update to 3.5.8 - resolves: #617482 - Thu Mar 3 2011 Guenther Deschner <gdeschner at redhat.com> - 3.5.7-73 - Security update to 3.5.7 to address CVE-2011-0719 - resolves: #681852 - Thu Jan 6 2011 Guenther Deschner <gdeschner at redhat.com> - 3.5.6-72 - Fix GSSAPI checksum for some SMB servers - resolves: #667644 - Thu Nov 18 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.6-71 - Fix libsmbclient SMB signing - resolves: #598620 - Mon Nov 1 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.6-70 - Handle no network case in init scripts - resolves: #604147 - Fri Oct 8 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.6-69 - Update to 3.5.6 - resolves: #617771 - Thu Sep 9 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.5-68 - Security Release, fixes CVE-2010-3069 - resolves: #630869 - Thu Aug 26 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-67 - Put winbind krb5 locator plugin into a separate rpm - resolves: #627181 - Tue Aug 24 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-66 - More fixes for winbind schannel - Thu Aug 19 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-65 - Fix winbind default domain - related: #618201 - Wed Aug 18 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-64 - Fix offline authentication - resolves: #618201 - Tue Aug 10 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-63 - Fix winbind secure channel (samlogonex) - Wed Jun 23 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.4-62 - Update to 3.5.4 - Wed May 19 2010 Guenther Deschner <gdeschner at redhat.com> - 3.5.3-61 - Update to 3.5.3 - Make sure nmb and smb initscripts return LSB compliant return codes - Fix winbind over ipv6 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id52723
    published2011-03-21
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/52723
    titleFedora 13 : samba-3.5.8-74.fc13 (2011-3120)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2010-0698.NASL
    descriptionUpdated samba3x packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the smb service will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id49233
    published2010-09-15
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/49233
    titleRHEL 5 : samba3x (RHSA-2010:0698)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2010-0697.NASL
    descriptionFrom Red Hat Security Advisory 2010:0697 : Updated samba packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux 3, 4, and 5, and Red Hat Enterprise Linux 4.7, 5.3, and 5.4 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) For Red Hat Enterprise Linux 4, this update also fixes the following bug : * Previously, the restorecon utility was required during the installation of the samba-common package. As a result, attempting to update samba without this utility installed may have failed with the following error : /var/tmp/rpm-tmp.[xxxxx]: line 7: restorecon: command not found With this update, the utility is only used when it is already present on the system, and the package is now always updated as expected. (BZ#629602) Users of Samba are advised to upgrade to these updated packages, which correct these issues. After installing this update, the smb service will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id68100
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68100
    titleOracle Linux 3 / 4 / 5 : samba (ELSA-2010-0697)
  • NASL familySuSE Local Security Checks
    NASL idSUSE9_12644.NASL
    descriptionA buffer overflow in the sid_parse() function of samba could potentially be exploited by remote attackers to execute arbitrary code. (CVE-2010-3069) Additionally the update also contains fixes for the following non-security issues : - bnc#567013 - Failed to join ADS Domain - bnc#592198 - Samba 3.0 / 3.2 doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id49759
    published2010-10-06
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/49759
    titleSuSE9 Security Update : Samba (YOU Patch Number 12644)
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2010-0019_REMOTE.NASL
    descriptionThe remote VMware ESX host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in several third-party components and libraries : - bzip2 - Network Security Services (NSS) Library - OpenSSL - Samba
    last seen2020-06-01
    modified2020-06-02
    plugin id89745
    published2016-03-08
    reporterThis script is Copyright (C) 2016-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/89745
    titleVMware ESX Multiple Vulnerabilities (VMSA-2010-0019) (remote check)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-14678.NASL
    description - Thu Sep 9 2010 Guenther Deschner <gdeschner at redhat.com> - 3.4.9-60 - Security Release, fixes CVE-2010-3069 - resolves: #630869 - Wed May 12 2010 Guenther Deschner <gdeschner at redhat.com> - 3.4.8-59 - Update to 3.4.8 - Make sure nmb and smb initscripts return LSB compliant return codes - resolves: #521095 - Mon Mar 8 2010 Simo Sorce <ssorce at redhat.com> - 3.4.7-58 - Security update to 3.4.7 - Fixes CVE-2010-0728 - Wed Feb 24 2010 Guenther Deschner <gdeschner at redhat.com> - 3.4.6-57 - Update to 3.4.6 - Wed Feb 17 2010 Guenther Deschner <gdeschner at redhat.com> - 3.4.5-56 - Fix crash in cifs.upcall - resolves: #565446 - Tue Jan 26 2010 Guenther Deschner <gdeschner at redhat.com> - 3.4.5-55 - Security Release, fixes CVE-2009-3297 - resolves: #532940 - Tue Jan 26 2010 Guenther Deschner <gdeschner at redhat.com> - 3.4.5-54 - Fix crash in pdbedit - resolves: #541267 - Tue Jan 19 2010 Guenther Deschner <gdeschner at redhat.com> - 3.4.5-53 - Update to 3.4.5 - Thu Jan 14 2010 Guenther Deschner <gdeschner at redhat.com> - 3.4.4-52 - Fix crash bug in libsmbclient (SMBC_parse_path) - resolves: #552658 - Thu Jan 7 2010 Guenther Deschner <gdeschner at redhat.com> - 3.4.4-51 - Update to 3.4.4 - Tue Dec 1 2009 Guenther Deschner <gdeschner at redhat.com> - 3.4.3-50 - Fix uninitialized rpc client pipe, causing winbind to crash - resolves: #541328 - Wed Nov 25 2009 Guenther Deschner <gdeschner at redhat.com> - 3.4.3-49 - Various updates to inline documentation in default smb.conf file - resolves: #483703 - Thu Oct 29 2009 Guenther Deschner <gdeschner at redhat.com> - 3.4.3-48 - Update to 3.4.3 Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id49248
    published2010-09-16
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/49248
    titleFedora 12 : samba-3.4.9-60.fc12 (2010-14678)
  • NASL familyUbuntu Local Security Checks
    NASL idUBUNTU_USN-987-1.NASL
    descriptionAndrew Bartlett discovered that Samba did not correctly validate the length when parsing SIDs. A remote attacker could send a specially crafted request to the server and cause a denial of service, or possibly execute arbitrary code with the privileges of the Samba service (smbd). The default compiler options for Ubuntu 8.04 LTS and newer should reduce the vulnerability to a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id49236
    published2010-09-15
    reporterUbuntu Security Notice (C) 2010-2019 Canonical, Inc. / NASL script (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/49236
    titleUbuntu 6.06 LTS / 8.04 LTS / 9.04 / 9.10 / 10.04 LTS : samba vulnerability (USN-987-1)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2010-14768.NASL
    description---------------------------------------------------------------------- ---------- Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id49249
    published2010-09-16
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/49249
    titleFedora 14 : samba-3.5.5-68.fc14 (2010-14768)
  • NASL familySolaris Local Security Checks
    NASL idSOLARIS10_X86_146364-01.NASL
    descriptionSunOS 5.10_x86: Samba patch. Date this patch was last updated by Sun : Jan/04/11
    last seen2020-06-01
    modified2020-06-02
    plugin id108085
    published2018-03-12
    reporterThis script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/108085
    titleSolaris 10 (x86) : 146364-01
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20101110_SAMBA_ON_SL6_X.NASL
    descriptionA missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) After installing this update, the smb service will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id60897
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/60897
    titleScientific Linux Security Update : samba on SL6.x i386/x86_64
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2010-0698.NASL
    descriptionUpdated samba3x packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A missing array boundary checking flaw was found in the way Samba parsed the binary representation of Windows security identifiers (SIDs). A malicious client could send a specially crafted SMB request to the Samba server, resulting in arbitrary code execution with the privileges of the Samba server (smbd). (CVE-2010-3069) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the smb service will be restarted automatically.
    last seen2020-06-01
    modified2020-06-02
    plugin id49262
    published2010-09-17
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/49262
    titleCentOS 5 : samba3x (CESA-2010:0698)

Redhat

advisories
  • bugzilla
    id630869
    titleCVE-2010-3069 Samba: Stack-based buffer overflow by processing specially-crafted SID records
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 4 is installed
        ovaloval:com.redhat.rhba:tst:20070304025
      • OR
        • AND
          • commentsamba-common is earlier than 0:3.0.33-0.19.el4_8.3
            ovaloval:com.redhat.rhsa:tst:20100697001
          • commentsamba-common is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060591002
        • AND
          • commentsamba-client is earlier than 0:3.0.33-0.19.el4_8.3
            ovaloval:com.redhat.rhsa:tst:20100697003
          • commentsamba-client is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060591004
        • AND
          • commentsamba-swat is earlier than 0:3.0.33-0.19.el4_8.3
            ovaloval:com.redhat.rhsa:tst:20100697005
          • commentsamba-swat is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060591008
        • AND
          • commentsamba is earlier than 0:3.0.33-0.19.el4_8.3
            ovaloval:com.redhat.rhsa:tst:20100697007
          • commentsamba is signed with Red Hat master key
            ovaloval:com.redhat.rhsa:tst:20060591006
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentsamba-common is earlier than 0:3.0.33-3.29.el5_5.1
            ovaloval:com.redhat.rhsa:tst:20100697010
          • commentsamba-common is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070061004
        • AND
          • commentsamba-client is earlier than 0:3.0.33-3.29.el5_5.1
            ovaloval:com.redhat.rhsa:tst:20100697012
          • commentsamba-client is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070061002
        • AND
          • commentlibsmbclient is earlier than 0:3.0.33-3.29.el5_5.1
            ovaloval:com.redhat.rhsa:tst:20100697014
          • commentlibsmbclient is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100488021
        • AND
          • commentsamba-swat is earlier than 0:3.0.33-3.29.el5_5.1
            ovaloval:com.redhat.rhsa:tst:20100697016
          • commentsamba-swat is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070061008
        • AND
          • commentsamba is earlier than 0:3.0.33-3.29.el5_5.1
            ovaloval:com.redhat.rhsa:tst:20100697018
          • commentsamba is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20070061006
        • AND
          • commentlibsmbclient-devel is earlier than 0:3.0.33-3.29.el5_5.1
            ovaloval:com.redhat.rhsa:tst:20100697020
          • commentlibsmbclient-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100488011
    rhsa
    idRHSA-2010:0697
    released2010-09-14
    severityCritical
    titleRHSA-2010:0697: samba security and bug fix update (Critical)
  • bugzilla
    id630869
    titleCVE-2010-3069 Samba: Stack-based buffer overflow by processing specially-crafted SID records
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 5 is installed
        ovaloval:com.redhat.rhba:tst:20070331005
      • OR
        • AND
          • commentsamba3x is earlier than 0:3.3.8-0.52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698001
          • commentsamba3x is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20110054004
        • AND
          • commentlibtdb-devel is earlier than 0:1.1.2-52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698003
          • commentlibtdb-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100488037
        • AND
          • commentsamba3x-domainjoin-gui is earlier than 0:3.3.8-0.52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698005
          • commentsamba3x-domainjoin-gui is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20110054010
        • AND
          • commenttdb-tools is earlier than 0:1.1.2-52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698007
          • commenttdb-tools is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100488045
        • AND
          • commentsamba3x-common is earlier than 0:3.3.8-0.52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698009
          • commentsamba3x-common is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20110054002
        • AND
          • commentlibtdb is earlier than 0:1.1.2-52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698011
          • commentlibtdb is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100488031
        • AND
          • commentlibtalloc-devel is earlier than 0:1.2.0-52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698013
          • commentlibtalloc-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100488047
        • AND
          • commentsamba3x-swat is earlier than 0:3.3.8-0.52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698015
          • commentsamba3x-swat is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20110054008
        • AND
          • commentsamba3x-winbind-devel is earlier than 0:3.3.8-0.52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698017
          • commentsamba3x-winbind-devel is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20110054016
        • AND
          • commentsamba3x-doc is earlier than 0:3.3.8-0.52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698019
          • commentsamba3x-doc is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20110054012
        • AND
          • commentsamba3x-client is earlier than 0:3.3.8-0.52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698021
          • commentsamba3x-client is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20110054006
        • AND
          • commentlibtalloc is earlier than 0:1.2.0-52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698023
          • commentlibtalloc is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhsa:tst:20100488027
        • AND
          • commentsamba3x-winbind is earlier than 0:3.3.8-0.52.el5_5.2
            ovaloval:com.redhat.rhsa:tst:20100698025
          • commentsamba3x-winbind is signed with Red Hat redhatrelease key
            ovaloval:com.redhat.rhba:tst:20110054014
    rhsa
    idRHSA-2010:0698
    released2010-09-14
    severityCritical
    titleRHSA-2010:0698: samba3x security update (Critical)
  • bugzilla
    id630869
    titleCVE-2010-3069 Samba: Stack-based buffer overflow by processing specially-crafted SID records
    oval
    OR
    • commentRed Hat Enterprise Linux must be installed
      ovaloval:com.redhat.rhba:tst:20070304026
    • AND
      • commentRed Hat Enterprise Linux 6 is installed
        ovaloval:com.redhat.rhba:tst:20111656003
      • OR
        • AND
          • commentsamba-domainjoin-gui is earlier than 0:3.5.4-68.el6_0.1
            ovaloval:com.redhat.rhsa:tst:20100860001
          • commentsamba-domainjoin-gui is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100860002
        • AND
          • commentlibsmbclient-devel is earlier than 0:3.5.4-68.el6_0.1
            ovaloval:com.redhat.rhsa:tst:20100860003
          • commentlibsmbclient-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20152258034
        • AND
          • commentsamba is earlier than 0:3.5.4-68.el6_0.1
            ovaloval:com.redhat.rhsa:tst:20100860005
          • commentsamba is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20152258022
        • AND
          • commentsamba-doc is earlier than 0:3.5.4-68.el6_0.1
            ovaloval:com.redhat.rhsa:tst:20100860007
          • commentsamba-doc is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100860008
        • AND
          • commentsamba-swat is earlier than 0:3.5.4-68.el6_0.1
            ovaloval:com.redhat.rhsa:tst:20100860009
          • commentsamba-swat is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100860010
        • AND
          • commentlibsmbclient is earlier than 0:3.5.4-68.el6_0.1
            ovaloval:com.redhat.rhsa:tst:20100860011
          • commentlibsmbclient is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20152258012
        • AND
          • commentsamba-winbind-devel is earlier than 0:3.5.4-68.el6_0.1
            ovaloval:com.redhat.rhsa:tst:20100860013
          • commentsamba-winbind-devel is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhsa:tst:20100860014
        • AND
          • commentsamba-winbind is earlier than 0:3.5.4-68.el6_0.1
            ovaloval:com.redhat.rhsa:tst:20100860015
          • commentsamba-winbind is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20152258010
        • AND
          • commentsamba-client is earlier than 0:3.5.4-68.el6_0.1
            ovaloval:com.redhat.rhsa:tst:20100860017
          • commentsamba-client is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20152258014
        • AND
          • commentsamba-common is earlier than 0:3.5.4-68.el6_0.1
            ovaloval:com.redhat.rhsa:tst:20100860019
          • commentsamba-common is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20152258006
        • AND
          • commentsamba-winbind-clients is earlier than 0:3.5.4-68.el6_0.1
            ovaloval:com.redhat.rhsa:tst:20100860021
          • commentsamba-winbind-clients is signed with Red Hat redhatrelease2 key
            ovaloval:com.redhat.rhba:tst:20152258018
    rhsa
    idRHSA-2010:0860
    released2010-11-09
    severityCritical
    titleRHSA-2010:0860: samba security update (Critical)
rpms
  • libsmbclient-0:3.0.33-3.29.el5_5.1
  • libsmbclient-devel-0:3.0.33-3.29.el5_5.1
  • samba-0:3.0.28-0.10.el4_7.1
  • samba-0:3.0.33-0.19.el4_8.3
  • samba-0:3.0.33-3.15.el5_4.3
  • samba-0:3.0.33-3.29.el5_5.1
  • samba-0:3.0.33-3.7.el5_3.3
  • samba-0:3.0.9-1.3E.18
  • samba-client-0:3.0.28-0.10.el4_7.1
  • samba-client-0:3.0.33-0.19.el4_8.3
  • samba-client-0:3.0.33-3.15.el5_4.3
  • samba-client-0:3.0.33-3.29.el5_5.1
  • samba-client-0:3.0.33-3.7.el5_3.3
  • samba-client-0:3.0.9-1.3E.18
  • samba-common-0:3.0.28-0.10.el4_7.1
  • samba-common-0:3.0.33-0.19.el4_8.3
  • samba-common-0:3.0.33-3.15.el5_4.3
  • samba-common-0:3.0.33-3.29.el5_5.1
  • samba-common-0:3.0.33-3.7.el5_3.3
  • samba-common-0:3.0.9-1.3E.18
  • samba-debuginfo-0:3.0.28-0.10.el4_7.1
  • samba-debuginfo-0:3.0.33-0.19.el4_8.3
  • samba-debuginfo-0:3.0.33-3.15.el5_4.3
  • samba-debuginfo-0:3.0.33-3.29.el5_5.1
  • samba-debuginfo-0:3.0.33-3.7.el5_3.3
  • samba-debuginfo-0:3.0.9-1.3E.18
  • samba-swat-0:3.0.28-0.10.el4_7.1
  • samba-swat-0:3.0.33-0.19.el4_8.3
  • samba-swat-0:3.0.33-3.15.el5_4.3
  • samba-swat-0:3.0.33-3.29.el5_5.1
  • samba-swat-0:3.0.33-3.7.el5_3.3
  • samba-swat-0:3.0.9-1.3E.18
  • libtalloc-0:1.2.0-52.el5_5.2
  • libtalloc-devel-0:1.2.0-52.el5_5.2
  • libtdb-0:1.1.2-52.el5_5.2
  • libtdb-devel-0:1.1.2-52.el5_5.2
  • samba3x-0:3.3.8-0.52.el5_5.2
  • samba3x-client-0:3.3.8-0.52.el5_5.2
  • samba3x-common-0:3.3.8-0.52.el5_5.2
  • samba3x-debuginfo-0:3.3.8-0.52.el5_5.2
  • samba3x-doc-0:3.3.8-0.52.el5_5.2
  • samba3x-domainjoin-gui-0:3.3.8-0.52.el5_5.2
  • samba3x-swat-0:3.3.8-0.52.el5_5.2
  • samba3x-winbind-0:3.3.8-0.52.el5_5.2
  • samba3x-winbind-devel-0:3.3.8-0.52.el5_5.2
  • tdb-tools-0:1.1.2-52.el5_5.2
  • libsmbclient-0:3.5.4-68.el6_0.1
  • libsmbclient-devel-0:3.5.4-68.el6_0.1
  • samba-0:3.5.4-68.el6_0.1
  • samba-client-0:3.5.4-68.el6_0.1
  • samba-common-0:3.5.4-68.el6_0.1
  • samba-debuginfo-0:3.5.4-68.el6_0.1
  • samba-doc-0:3.5.4-68.el6_0.1
  • samba-domainjoin-gui-0:3.5.4-68.el6_0.1
  • samba-swat-0:3.5.4-68.el6_0.1
  • samba-winbind-0:3.5.4-68.el6_0.1
  • samba-winbind-clients-0:3.5.4-68.el6_0.1
  • samba-winbind-devel-0:3.5.4-68.el6_0.1