ID

VAR-201204-0112


CVE

CVE-2012-1182


TITLE

Samba of RPC Code generator vulnerable to arbitrary code execution

Trust: 0.8

sources: JVNDB: JVNDB-2011-005032

DESCRIPTION

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call. When parsing the data send in the request Samba uses the field 'settings' to create a heap allocation but then uses another field, 'count', to write data to the allocation. Authentication is not required to exploit this vulnerability. The specific flaw exists within Samba's handling of a NDR PULL DFS EnumArray1 request. By sending a specially crafted packet, it is possible to cause Samba to use a different size for memory allocation than it uses for a memory copy loop. This can result in memory corruption, and may be exploited by an attacker to gain remote code execution. Samba is prone to a remote-code-execution vulnerability. Failed exploit attempts will cause a denial-of-service condition. Samba versions 3.0 through 3.6.3 are vulnerable. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Note: the current version of the following document is available here: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c03365218 SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: c03365218 Version: 1 HPSBUX02789 SSRT100824 rev.1 - HP-UX CIFS Server (Samba), Remote Execution of Arbitrary Code, Elevation of Privileges NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2012-06-13 Last Updated: 2012-06-13 ---------------------------------------------------------------------------- - -- Potential Security Impact: Remote execution of arbitrary code, elevation of privileges Source: Hewlett-Packard Company, HP Software Security Response Team VULNERABILITY SUMMARY Potential security vulnerabilities have been identified with HP-UX CIFS-Server (Samba). References: CVE-2012-1182, CVE-2012-2111 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.23, B.11.31 running HP-UX CIFS-Server (Samba) A.03.01.04 or earlier BACKGROUND CVSS 2.0 Base Metrics =========================================================== Reference Base Vector Base Score CVE-2012-1182 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2012-2111 (AV:N/AC:L/Au:S/C:P/I:P/A:P) 6.5 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002 RESOLUTION HP has provided the following software update to resolve the vulnerabilities. The update is available for download from http://software.hp.com HP-UX CIFS-Server (Samba) HP-UX Release / Apache Depot name A.03.01.05 11i v2 / B8725AA_A.03.01.05_HP-UX_B.11.23_IA_PA.depot 11i v3 / CIFS-SERVER_A.03.01.05_HP-UX_B.11.31_IA_PA.depot MANUAL ACTIONS: Yes - Update Install HP-UX CIFS-Server (Samba) A.03.01.05 or subsequent. PRODUCT SPECIFIC INFORMATION HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see https://www.hp.com/go/swa The following text is for use by the HP-UX Software Assistant. AFFECTED VERSIONS HP-UX B.11.23 HP-UX B.11.31 ================== CIFS-Development.CIFS-PRG CIFS-Server.CIFS-ADMIN CIFS-Server.CIFS-DOC CIFS-Server.CIFS-LIB CIFS-Server.CIFS-RUN CIFS-Server.CIFS-UTIL action: install revision A.03.01.05 or subsequent END AFFECTED VERSIONS HISTORY Version:1 (rev.1) - 13 June 2012 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins Security Bulletin List: A list of HP Security Bulletins, updated periodically, is contained in HP Security Notice HPSN-2011-001: https://h20566.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c02964430 Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/ Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX Copyright 2012 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. (CVE-2012-1182) The samba4 packages have been upgraded to upstream version 4.0.0, which provides a number of bug fixes and enhancements over the previous version. In particular, improved interoperability with Active Directory (AD) domains. SSSD now uses the libndr-krb5pac library to parse the Privilege Attribute Certificate (PAC) issued by an AD Key Distribution Center (KDC). The Cross Realm Kerberos Trust functionality provided by Identity Management, which relies on the capabilities of the samba4 client library, is included as a Technology Preview. This functionality and server libraries, is included as a Technology Preview. This functionality uses the libndr-nbt library to prepare Connection-less Lightweight Directory Access Protocol (CLDAP) messages. Additionally, various improvements have been made to the Local Security Authority (LSA) and Net Logon services to allow verification of trust from a Windows system. Because the Cross Realm Kerberos Trust functionality is considered a Technology Preview, selected samba4 components are considered to be a Technology Preview. For more information on which Samba packages are considered a Technology Preview, refer to Table 5.1, "Samba4 Package Support" in the Release Notes, linked to from the References. (BZ#766333, BZ#882188) This update also fixes the following bug: * Prior to this update, if the Active Directory (AD) server was rebooted, Winbind sometimes failed to reconnect when requested by "wbinfo -n" or "wbinfo -s" commands. Consequently, looking up users using the wbinfo tool failed. This update applies upstream patches to fix this problem and now looking up a Security Identifier (SID) for a username, or a username for a given SID, works as expected after a domain controller is rebooted. 867854 - auth_builtin auth_domain auth_sam and auth_winbind are built as shared modules. 868248 - samba-winbind package wants /var/log/samba 868419 - samba4 smb and winbind init scripts missing export KRB5CCNAME 877085 - Wrong sysconfig filename 878564 - IPA trust cannot always lookup AD users with wbinfo 882188 - samba4-libs: yyin symbol collision 885089 - Samba netlogon AES support incorrect 886157 - samba4 should use the same winbind pipes as samba 895718 - Incomplete rpm provides filters causes issues with the samba4-libs package on certain architectures 6. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Critical: samba security update Advisory ID: RHSA-2012:0465-01 Product: Red Hat Enterprise Linux Advisory URL: https://rhn.redhat.com/errata/RHSA-2012-0465.html Issue date: 2012-04-10 CVE Names: CVE-2012-1182 ===================================================================== 1. Summary: Updated samba packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6; Red Hat Enterprise Linux 5.3 Long Life; and Red Hat Enterprise Linux 5.6, 6.0 and 6.1 Extended Update Support. The Red Hat Security Response Team has rated this update as having critical security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: RHEL Desktop Workstation (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux Desktop (v. 5 client) - i386, x86_64 Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, ppc, s390x, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Long Life (v. 5.3 server) - i386, ia64, x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.0) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server EUS (v. 6.1) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6.0.z) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - i386, x86_64 3. Description: Samba is an open-source implementation of the Server Message Block (SMB) or Common Internet File System (CIFS) protocol, which allows PC-compatible machines to share files, printers, and other information. A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used to generate code to handle RPC calls, resulted in multiple buffer overflows in Samba. (CVE-2012-1182) Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue. After installing this update, the smb service will be restarted automatically. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258 5. Bugs fixed (http://bugzilla.redhat.com/): 804093 - CVE-2012-1182 samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output 6. Package List: Red Hat Enterprise Linux Desktop (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/samba-3.0.33-3.39.el5_8.src.rpm i386: libsmbclient-3.0.33-3.39.el5_8.i386.rpm samba-3.0.33-3.39.el5_8.i386.rpm samba-client-3.0.33-3.39.el5_8.i386.rpm samba-common-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm samba-swat-3.0.33-3.39.el5_8.i386.rpm x86_64: libsmbclient-3.0.33-3.39.el5_8.i386.rpm libsmbclient-3.0.33-3.39.el5_8.x86_64.rpm samba-3.0.33-3.39.el5_8.x86_64.rpm samba-client-3.0.33-3.39.el5_8.x86_64.rpm samba-common-3.0.33-3.39.el5_8.i386.rpm samba-common-3.0.33-3.39.el5_8.x86_64.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.x86_64.rpm samba-swat-3.0.33-3.39.el5_8.x86_64.rpm RHEL Desktop Workstation (v. 5 client): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Client/en/os/SRPMS/samba-3.0.33-3.39.el5_8.src.rpm i386: libsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm x86_64: libsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm libsmbclient-devel-3.0.33-3.39.el5_8.x86_64.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.x86_64.rpm Red Hat Enterprise Linux Long Life (v. 5.3 server): Source: samba-3.0.33-3.7.el5_3.5.src.rpm i386: samba-3.0.33-3.7.el5_3.5.i386.rpm samba-client-3.0.33-3.7.el5_3.5.i386.rpm samba-common-3.0.33-3.7.el5_3.5.i386.rpm samba-debuginfo-3.0.33-3.7.el5_3.5.i386.rpm samba-swat-3.0.33-3.7.el5_3.5.i386.rpm ia64: samba-3.0.33-3.7.el5_3.5.ia64.rpm samba-client-3.0.33-3.7.el5_3.5.ia64.rpm samba-common-3.0.33-3.7.el5_3.5.ia64.rpm samba-debuginfo-3.0.33-3.7.el5_3.5.ia64.rpm samba-swat-3.0.33-3.7.el5_3.5.ia64.rpm x86_64: samba-3.0.33-3.7.el5_3.5.x86_64.rpm samba-client-3.0.33-3.7.el5_3.5.x86_64.rpm samba-common-3.0.33-3.7.el5_3.5.i386.rpm samba-common-3.0.33-3.7.el5_3.5.x86_64.rpm samba-debuginfo-3.0.33-3.7.el5_3.5.i386.rpm samba-debuginfo-3.0.33-3.7.el5_3.5.x86_64.rpm samba-swat-3.0.33-3.7.el5_3.5.x86_64.rpm Red Hat Enterprise Linux EUS (v. 5.6 server): Source: samba-3.0.33-3.29.el5_6.5.src.rpm i386: libsmbclient-3.0.33-3.29.el5_6.5.i386.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.i386.rpm samba-3.0.33-3.29.el5_6.5.i386.rpm samba-client-3.0.33-3.29.el5_6.5.i386.rpm samba-common-3.0.33-3.29.el5_6.5.i386.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.i386.rpm samba-swat-3.0.33-3.29.el5_6.5.i386.rpm ia64: libsmbclient-3.0.33-3.29.el5_6.5.ia64.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.ia64.rpm samba-3.0.33-3.29.el5_6.5.ia64.rpm samba-client-3.0.33-3.29.el5_6.5.ia64.rpm samba-common-3.0.33-3.29.el5_6.5.ia64.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.ia64.rpm samba-swat-3.0.33-3.29.el5_6.5.ia64.rpm ppc: libsmbclient-3.0.33-3.29.el5_6.5.ppc.rpm libsmbclient-3.0.33-3.29.el5_6.5.ppc64.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.ppc.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.ppc64.rpm samba-3.0.33-3.29.el5_6.5.ppc.rpm samba-client-3.0.33-3.29.el5_6.5.ppc.rpm samba-common-3.0.33-3.29.el5_6.5.ppc.rpm samba-common-3.0.33-3.29.el5_6.5.ppc64.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.ppc.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.ppc64.rpm samba-swat-3.0.33-3.29.el5_6.5.ppc.rpm s390x: libsmbclient-3.0.33-3.29.el5_6.5.s390.rpm libsmbclient-3.0.33-3.29.el5_6.5.s390x.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.s390.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.s390x.rpm samba-3.0.33-3.29.el5_6.5.s390x.rpm samba-client-3.0.33-3.29.el5_6.5.s390x.rpm samba-common-3.0.33-3.29.el5_6.5.s390.rpm samba-common-3.0.33-3.29.el5_6.5.s390x.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.s390.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.s390x.rpm samba-swat-3.0.33-3.29.el5_6.5.s390x.rpm x86_64: libsmbclient-3.0.33-3.29.el5_6.5.i386.rpm libsmbclient-3.0.33-3.29.el5_6.5.x86_64.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.i386.rpm libsmbclient-devel-3.0.33-3.29.el5_6.5.x86_64.rpm samba-3.0.33-3.29.el5_6.5.x86_64.rpm samba-client-3.0.33-3.29.el5_6.5.x86_64.rpm samba-common-3.0.33-3.29.el5_6.5.i386.rpm samba-common-3.0.33-3.29.el5_6.5.x86_64.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.i386.rpm samba-debuginfo-3.0.33-3.29.el5_6.5.x86_64.rpm samba-swat-3.0.33-3.29.el5_6.5.x86_64.rpm Red Hat Enterprise Linux (v. 5 server): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/os/SRPMS/samba-3.0.33-3.39.el5_8.src.rpm i386: libsmbclient-3.0.33-3.39.el5_8.i386.rpm libsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm samba-3.0.33-3.39.el5_8.i386.rpm samba-client-3.0.33-3.39.el5_8.i386.rpm samba-common-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm samba-swat-3.0.33-3.39.el5_8.i386.rpm ia64: libsmbclient-3.0.33-3.39.el5_8.ia64.rpm libsmbclient-devel-3.0.33-3.39.el5_8.ia64.rpm samba-3.0.33-3.39.el5_8.ia64.rpm samba-client-3.0.33-3.39.el5_8.ia64.rpm samba-common-3.0.33-3.39.el5_8.ia64.rpm samba-debuginfo-3.0.33-3.39.el5_8.ia64.rpm samba-swat-3.0.33-3.39.el5_8.ia64.rpm ppc: libsmbclient-3.0.33-3.39.el5_8.ppc.rpm libsmbclient-3.0.33-3.39.el5_8.ppc64.rpm libsmbclient-devel-3.0.33-3.39.el5_8.ppc.rpm libsmbclient-devel-3.0.33-3.39.el5_8.ppc64.rpm samba-3.0.33-3.39.el5_8.ppc.rpm samba-client-3.0.33-3.39.el5_8.ppc.rpm samba-common-3.0.33-3.39.el5_8.ppc.rpm samba-common-3.0.33-3.39.el5_8.ppc64.rpm samba-debuginfo-3.0.33-3.39.el5_8.ppc.rpm samba-debuginfo-3.0.33-3.39.el5_8.ppc64.rpm samba-swat-3.0.33-3.39.el5_8.ppc.rpm s390x: libsmbclient-3.0.33-3.39.el5_8.s390.rpm libsmbclient-3.0.33-3.39.el5_8.s390x.rpm libsmbclient-devel-3.0.33-3.39.el5_8.s390.rpm libsmbclient-devel-3.0.33-3.39.el5_8.s390x.rpm samba-3.0.33-3.39.el5_8.s390x.rpm samba-client-3.0.33-3.39.el5_8.s390x.rpm samba-common-3.0.33-3.39.el5_8.s390.rpm samba-common-3.0.33-3.39.el5_8.s390x.rpm samba-debuginfo-3.0.33-3.39.el5_8.s390.rpm samba-debuginfo-3.0.33-3.39.el5_8.s390x.rpm samba-swat-3.0.33-3.39.el5_8.s390x.rpm x86_64: libsmbclient-3.0.33-3.39.el5_8.i386.rpm libsmbclient-3.0.33-3.39.el5_8.x86_64.rpm libsmbclient-devel-3.0.33-3.39.el5_8.i386.rpm libsmbclient-devel-3.0.33-3.39.el5_8.x86_64.rpm samba-3.0.33-3.39.el5_8.x86_64.rpm samba-client-3.0.33-3.39.el5_8.x86_64.rpm samba-common-3.0.33-3.39.el5_8.i386.rpm samba-common-3.0.33-3.39.el5_8.x86_64.rpm samba-debuginfo-3.0.33-3.39.el5_8.i386.rpm samba-debuginfo-3.0.33-3.39.el5_8.x86_64.rpm samba-swat-3.0.33-3.39.el5_8.x86_64.rpm Red Hat Enterprise Linux Desktop (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm i386: libsmbclient-3.5.10-115.el6_2.i686.rpm samba-client-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-winbind-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm x86_64: libsmbclient-3.5.10-115.el6_2.i686.rpm libsmbclient-3.5.10-115.el6_2.x86_64.rpm samba-client-3.5.10-115.el6_2.x86_64.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-winbind-3.5.10-115.el6_2.x86_64.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm Red Hat Enterprise Linux Desktop Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Client/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm i386: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm samba-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-doc-3.5.10-115.el6_2.i686.rpm samba-domainjoin-gui-3.5.10-115.el6_2.i686.rpm samba-swat-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.i686.rpm x86_64: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm libsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm samba-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-doc-3.5.10-115.el6_2.x86_64.rpm samba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm samba-swat-3.5.10-115.el6_2.x86_64.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm Red Hat Enterprise Linux HPC Node (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm x86_64: samba-client-3.5.10-115.el6_2.x86_64.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-winbind-3.5.10-115.el6_2.x86_64.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm Red Hat Enterprise Linux HPC Node Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6ComputeNode/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm x86_64: libsmbclient-3.5.10-115.el6_2.i686.rpm libsmbclient-3.5.10-115.el6_2.x86_64.rpm libsmbclient-devel-3.5.10-115.el6_2.i686.rpm libsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm samba-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-doc-3.5.10-115.el6_2.x86_64.rpm samba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm samba-swat-3.5.10-115.el6_2.x86_64.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.0): Source: samba-3.5.4-68.el6_0.3.src.rpm i386: libsmbclient-3.5.4-68.el6_0.3.i686.rpm samba-3.5.4-68.el6_0.3.i686.rpm samba-client-3.5.4-68.el6_0.3.i686.rpm samba-common-3.5.4-68.el6_0.3.i686.rpm samba-debuginfo-3.5.4-68.el6_0.3.i686.rpm samba-winbind-3.5.4-68.el6_0.3.i686.rpm samba-winbind-clients-3.5.4-68.el6_0.3.i686.rpm ppc64: libsmbclient-3.5.4-68.el6_0.3.ppc.rpm libsmbclient-3.5.4-68.el6_0.3.ppc64.rpm samba-3.5.4-68.el6_0.3.ppc64.rpm samba-client-3.5.4-68.el6_0.3.ppc64.rpm samba-common-3.5.4-68.el6_0.3.ppc.rpm samba-common-3.5.4-68.el6_0.3.ppc64.rpm samba-debuginfo-3.5.4-68.el6_0.3.ppc.rpm samba-debuginfo-3.5.4-68.el6_0.3.ppc64.rpm samba-winbind-3.5.4-68.el6_0.3.ppc64.rpm samba-winbind-clients-3.5.4-68.el6_0.3.ppc.rpm samba-winbind-clients-3.5.4-68.el6_0.3.ppc64.rpm s390x: libsmbclient-3.5.4-68.el6_0.3.s390.rpm libsmbclient-3.5.4-68.el6_0.3.s390x.rpm samba-3.5.4-68.el6_0.3.s390x.rpm samba-client-3.5.4-68.el6_0.3.s390x.rpm samba-common-3.5.4-68.el6_0.3.s390.rpm samba-common-3.5.4-68.el6_0.3.s390x.rpm samba-debuginfo-3.5.4-68.el6_0.3.s390.rpm samba-debuginfo-3.5.4-68.el6_0.3.s390x.rpm samba-winbind-3.5.4-68.el6_0.3.s390x.rpm samba-winbind-clients-3.5.4-68.el6_0.3.s390.rpm samba-winbind-clients-3.5.4-68.el6_0.3.s390x.rpm x86_64: libsmbclient-3.5.4-68.el6_0.3.i686.rpm libsmbclient-3.5.4-68.el6_0.3.x86_64.rpm samba-3.5.4-68.el6_0.3.x86_64.rpm samba-client-3.5.4-68.el6_0.3.x86_64.rpm samba-common-3.5.4-68.el6_0.3.i686.rpm samba-common-3.5.4-68.el6_0.3.x86_64.rpm samba-debuginfo-3.5.4-68.el6_0.3.i686.rpm samba-debuginfo-3.5.4-68.el6_0.3.x86_64.rpm samba-winbind-3.5.4-68.el6_0.3.x86_64.rpm samba-winbind-clients-3.5.4-68.el6_0.3.i686.rpm samba-winbind-clients-3.5.4-68.el6_0.3.x86_64.rpm Red Hat Enterprise Linux Server EUS (v. 6.1): Source: samba-3.5.6-86.el6_1.5.src.rpm i386: libsmbclient-3.5.6-86.el6_1.5.i686.rpm samba-3.5.6-86.el6_1.5.i686.rpm samba-client-3.5.6-86.el6_1.5.i686.rpm samba-common-3.5.6-86.el6_1.5.i686.rpm samba-debuginfo-3.5.6-86.el6_1.5.i686.rpm samba-winbind-3.5.6-86.el6_1.5.i686.rpm samba-winbind-clients-3.5.6-86.el6_1.5.i686.rpm ppc64: libsmbclient-3.5.6-86.el6_1.5.ppc.rpm libsmbclient-3.5.6-86.el6_1.5.ppc64.rpm samba-3.5.6-86.el6_1.5.ppc64.rpm samba-client-3.5.6-86.el6_1.5.ppc64.rpm samba-common-3.5.6-86.el6_1.5.ppc.rpm samba-common-3.5.6-86.el6_1.5.ppc64.rpm samba-debuginfo-3.5.6-86.el6_1.5.ppc.rpm samba-debuginfo-3.5.6-86.el6_1.5.ppc64.rpm samba-winbind-3.5.6-86.el6_1.5.ppc64.rpm samba-winbind-clients-3.5.6-86.el6_1.5.ppc.rpm samba-winbind-clients-3.5.6-86.el6_1.5.ppc64.rpm s390x: libsmbclient-3.5.6-86.el6_1.5.s390.rpm libsmbclient-3.5.6-86.el6_1.5.s390x.rpm samba-3.5.6-86.el6_1.5.s390x.rpm samba-client-3.5.6-86.el6_1.5.s390x.rpm samba-common-3.5.6-86.el6_1.5.s390.rpm samba-common-3.5.6-86.el6_1.5.s390x.rpm samba-debuginfo-3.5.6-86.el6_1.5.s390.rpm samba-debuginfo-3.5.6-86.el6_1.5.s390x.rpm samba-winbind-3.5.6-86.el6_1.5.s390x.rpm samba-winbind-clients-3.5.6-86.el6_1.5.s390.rpm samba-winbind-clients-3.5.6-86.el6_1.5.s390x.rpm x86_64: libsmbclient-3.5.6-86.el6_1.5.i686.rpm libsmbclient-3.5.6-86.el6_1.5.x86_64.rpm samba-3.5.6-86.el6_1.5.x86_64.rpm samba-client-3.5.6-86.el6_1.5.x86_64.rpm samba-common-3.5.6-86.el6_1.5.i686.rpm samba-common-3.5.6-86.el6_1.5.x86_64.rpm samba-debuginfo-3.5.6-86.el6_1.5.i686.rpm samba-debuginfo-3.5.6-86.el6_1.5.x86_64.rpm samba-winbind-3.5.6-86.el6_1.5.x86_64.rpm samba-winbind-clients-3.5.6-86.el6_1.5.i686.rpm samba-winbind-clients-3.5.6-86.el6_1.5.x86_64.rpm Red Hat Enterprise Linux Server (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm i386: libsmbclient-3.5.10-115.el6_2.i686.rpm samba-3.5.10-115.el6_2.i686.rpm samba-client-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-winbind-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm ppc64: libsmbclient-3.5.10-115.el6_2.ppc.rpm libsmbclient-3.5.10-115.el6_2.ppc64.rpm samba-3.5.10-115.el6_2.ppc64.rpm samba-client-3.5.10-115.el6_2.ppc64.rpm samba-common-3.5.10-115.el6_2.ppc.rpm samba-common-3.5.10-115.el6_2.ppc64.rpm samba-debuginfo-3.5.10-115.el6_2.ppc.rpm samba-debuginfo-3.5.10-115.el6_2.ppc64.rpm samba-winbind-3.5.10-115.el6_2.ppc64.rpm samba-winbind-clients-3.5.10-115.el6_2.ppc.rpm samba-winbind-clients-3.5.10-115.el6_2.ppc64.rpm s390x: libsmbclient-3.5.10-115.el6_2.s390.rpm libsmbclient-3.5.10-115.el6_2.s390x.rpm samba-3.5.10-115.el6_2.s390x.rpm samba-client-3.5.10-115.el6_2.s390x.rpm samba-common-3.5.10-115.el6_2.s390.rpm samba-common-3.5.10-115.el6_2.s390x.rpm samba-debuginfo-3.5.10-115.el6_2.s390.rpm samba-debuginfo-3.5.10-115.el6_2.s390x.rpm samba-winbind-3.5.10-115.el6_2.s390x.rpm samba-winbind-clients-3.5.10-115.el6_2.s390.rpm samba-winbind-clients-3.5.10-115.el6_2.s390x.rpm x86_64: libsmbclient-3.5.10-115.el6_2.i686.rpm libsmbclient-3.5.10-115.el6_2.x86_64.rpm samba-3.5.10-115.el6_2.x86_64.rpm samba-client-3.5.10-115.el6_2.x86_64.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-winbind-3.5.10-115.el6_2.x86_64.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6.0.z): Source: samba-3.5.4-68.el6_0.3.src.rpm i386: libsmbclient-devel-3.5.4-68.el6_0.3.i686.rpm samba-debuginfo-3.5.4-68.el6_0.3.i686.rpm samba-doc-3.5.4-68.el6_0.3.i686.rpm samba-domainjoin-gui-3.5.4-68.el6_0.3.i686.rpm samba-swat-3.5.4-68.el6_0.3.i686.rpm samba-winbind-devel-3.5.4-68.el6_0.3.i686.rpm ppc64: libsmbclient-devel-3.5.4-68.el6_0.3.ppc.rpm libsmbclient-devel-3.5.4-68.el6_0.3.ppc64.rpm samba-debuginfo-3.5.4-68.el6_0.3.ppc.rpm samba-debuginfo-3.5.4-68.el6_0.3.ppc64.rpm samba-doc-3.5.4-68.el6_0.3.ppc64.rpm samba-domainjoin-gui-3.5.4-68.el6_0.3.ppc64.rpm samba-swat-3.5.4-68.el6_0.3.ppc64.rpm samba-winbind-devel-3.5.4-68.el6_0.3.ppc.rpm samba-winbind-devel-3.5.4-68.el6_0.3.ppc64.rpm s390x: libsmbclient-devel-3.5.4-68.el6_0.3.s390.rpm libsmbclient-devel-3.5.4-68.el6_0.3.s390x.rpm samba-debuginfo-3.5.4-68.el6_0.3.s390.rpm samba-debuginfo-3.5.4-68.el6_0.3.s390x.rpm samba-doc-3.5.4-68.el6_0.3.s390x.rpm samba-domainjoin-gui-3.5.4-68.el6_0.3.s390x.rpm samba-swat-3.5.4-68.el6_0.3.s390x.rpm samba-winbind-devel-3.5.4-68.el6_0.3.s390.rpm samba-winbind-devel-3.5.4-68.el6_0.3.s390x.rpm x86_64: libsmbclient-devel-3.5.4-68.el6_0.3.i686.rpm libsmbclient-devel-3.5.4-68.el6_0.3.x86_64.rpm samba-debuginfo-3.5.4-68.el6_0.3.i686.rpm samba-debuginfo-3.5.4-68.el6_0.3.x86_64.rpm samba-doc-3.5.4-68.el6_0.3.x86_64.rpm samba-domainjoin-gui-3.5.4-68.el6_0.3.x86_64.rpm samba-swat-3.5.4-68.el6_0.3.x86_64.rpm samba-winbind-devel-3.5.4-68.el6_0.3.i686.rpm samba-winbind-devel-3.5.4-68.el6_0.3.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: samba-3.5.6-86.el6_1.5.src.rpm i386: libsmbclient-devel-3.5.6-86.el6_1.5.i686.rpm samba-debuginfo-3.5.6-86.el6_1.5.i686.rpm samba-doc-3.5.6-86.el6_1.5.i686.rpm samba-domainjoin-gui-3.5.6-86.el6_1.5.i686.rpm samba-swat-3.5.6-86.el6_1.5.i686.rpm samba-winbind-devel-3.5.6-86.el6_1.5.i686.rpm samba-winbind-krb5-locator-3.5.6-86.el6_1.5.i686.rpm ppc64: libsmbclient-devel-3.5.6-86.el6_1.5.ppc.rpm libsmbclient-devel-3.5.6-86.el6_1.5.ppc64.rpm samba-debuginfo-3.5.6-86.el6_1.5.ppc.rpm samba-debuginfo-3.5.6-86.el6_1.5.ppc64.rpm samba-doc-3.5.6-86.el6_1.5.ppc64.rpm samba-domainjoin-gui-3.5.6-86.el6_1.5.ppc64.rpm samba-swat-3.5.6-86.el6_1.5.ppc64.rpm samba-winbind-devel-3.5.6-86.el6_1.5.ppc.rpm samba-winbind-devel-3.5.6-86.el6_1.5.ppc64.rpm samba-winbind-krb5-locator-3.5.6-86.el6_1.5.ppc64.rpm s390x: libsmbclient-devel-3.5.6-86.el6_1.5.s390.rpm libsmbclient-devel-3.5.6-86.el6_1.5.s390x.rpm samba-debuginfo-3.5.6-86.el6_1.5.s390.rpm samba-debuginfo-3.5.6-86.el6_1.5.s390x.rpm samba-doc-3.5.6-86.el6_1.5.s390x.rpm samba-domainjoin-gui-3.5.6-86.el6_1.5.s390x.rpm samba-swat-3.5.6-86.el6_1.5.s390x.rpm samba-winbind-devel-3.5.6-86.el6_1.5.s390.rpm samba-winbind-devel-3.5.6-86.el6_1.5.s390x.rpm samba-winbind-krb5-locator-3.5.6-86.el6_1.5.s390x.rpm x86_64: libsmbclient-devel-3.5.6-86.el6_1.5.i686.rpm libsmbclient-devel-3.5.6-86.el6_1.5.x86_64.rpm samba-debuginfo-3.5.6-86.el6_1.5.i686.rpm samba-debuginfo-3.5.6-86.el6_1.5.x86_64.rpm samba-doc-3.5.6-86.el6_1.5.x86_64.rpm samba-domainjoin-gui-3.5.6-86.el6_1.5.x86_64.rpm samba-swat-3.5.6-86.el6_1.5.x86_64.rpm samba-winbind-devel-3.5.6-86.el6_1.5.i686.rpm samba-winbind-devel-3.5.6-86.el6_1.5.x86_64.rpm samba-winbind-krb5-locator-3.5.6-86.el6_1.5.x86_64.rpm Red Hat Enterprise Linux Server Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm i386: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-doc-3.5.10-115.el6_2.i686.rpm samba-domainjoin-gui-3.5.10-115.el6_2.i686.rpm samba-swat-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.i686.rpm ppc64: libsmbclient-devel-3.5.10-115.el6_2.ppc.rpm libsmbclient-devel-3.5.10-115.el6_2.ppc64.rpm samba-debuginfo-3.5.10-115.el6_2.ppc.rpm samba-debuginfo-3.5.10-115.el6_2.ppc64.rpm samba-doc-3.5.10-115.el6_2.ppc64.rpm samba-domainjoin-gui-3.5.10-115.el6_2.ppc64.rpm samba-swat-3.5.10-115.el6_2.ppc64.rpm samba-winbind-devel-3.5.10-115.el6_2.ppc.rpm samba-winbind-devel-3.5.10-115.el6_2.ppc64.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.ppc64.rpm s390x: libsmbclient-devel-3.5.10-115.el6_2.s390.rpm libsmbclient-devel-3.5.10-115.el6_2.s390x.rpm samba-debuginfo-3.5.10-115.el6_2.s390.rpm samba-debuginfo-3.5.10-115.el6_2.s390x.rpm samba-doc-3.5.10-115.el6_2.s390x.rpm samba-domainjoin-gui-3.5.10-115.el6_2.s390x.rpm samba-swat-3.5.10-115.el6_2.s390x.rpm samba-winbind-devel-3.5.10-115.el6_2.s390.rpm samba-winbind-devel-3.5.10-115.el6_2.s390x.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.s390x.rpm x86_64: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm libsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-doc-3.5.10-115.el6_2.x86_64.rpm samba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm samba-swat-3.5.10-115.el6_2.x86_64.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm Red Hat Enterprise Linux Workstation (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm i386: libsmbclient-3.5.10-115.el6_2.i686.rpm samba-3.5.10-115.el6_2.i686.rpm samba-client-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-winbind-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm x86_64: libsmbclient-3.5.10-115.el6_2.i686.rpm libsmbclient-3.5.10-115.el6_2.x86_64.rpm samba-3.5.10-115.el6_2.x86_64.rpm samba-client-3.5.10-115.el6_2.x86_64.rpm samba-common-3.5.10-115.el6_2.i686.rpm samba-common-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-winbind-3.5.10-115.el6_2.x86_64.rpm samba-winbind-clients-3.5.10-115.el6_2.i686.rpm samba-winbind-clients-3.5.10-115.el6_2.x86_64.rpm Red Hat Enterprise Linux Workstation Optional (v. 6): Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Workstation/en/os/SRPMS/samba-3.5.10-115.el6_2.src.rpm i386: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-doc-3.5.10-115.el6_2.i686.rpm samba-domainjoin-gui-3.5.10-115.el6_2.i686.rpm samba-swat-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.i686.rpm x86_64: libsmbclient-devel-3.5.10-115.el6_2.i686.rpm libsmbclient-devel-3.5.10-115.el6_2.x86_64.rpm samba-debuginfo-3.5.10-115.el6_2.i686.rpm samba-debuginfo-3.5.10-115.el6_2.x86_64.rpm samba-doc-3.5.10-115.el6_2.x86_64.rpm samba-domainjoin-gui-3.5.10-115.el6_2.x86_64.rpm samba-swat-3.5.10-115.el6_2.x86_64.rpm samba-winbind-devel-3.5.10-115.el6_2.i686.rpm samba-winbind-devel-3.5.10-115.el6_2.x86_64.rpm samba-winbind-krb5-locator-3.5.10-115.el6_2.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package 7. References: https://www.redhat.com/security/data/cve/CVE-2012-1182.html https://access.redhat.com/security/updates/classification/#critical 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2012 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.4 (GNU/Linux) iD8DBQFPhKMWXlSAg2UNWIIRAk8XAKCPxrS7IDoIlqr0tNZZiZEE3bCLIwCfZ0DY qQZ8Iim8i5o7EbExdP7Kkjc= =Q/7p -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Description: The openchange packages provide libraries to access Microsoft Exchange servers using native protocols. Evolution-MAPI uses these libraries to integrate the Evolution PIM application with Microsoft Exchange servers. With this update, the code has been generated with an updated version of PIDL to correct this issue. (BZ#767672, BZ#767678) This update also fixes the following bugs: * When the user tried to modify a meeting with one required attendee and himself as the organizer, a segmentation fault occurred in the memcpy() function. Consequently, the evolution-data-server application terminated unexpectedly with a segmentation fault. This bug has been fixed and evolution-data-server no longer crashes in the described scenario. (BZ#680061) * Prior to this update, OpenChange 1.0 was unable to send messages with a large message body or with extensive attachment. This was caused by minor issues in OpenChange's exchange.idl definitions. This bug has been fixed and OpenChange now sends extensive messages without complications. Content-Disposition: inline ==========================================================================Ubuntu Security Notice USN-1423-1 April 13, 2012 samba vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.04 LTS - Ubuntu 8.04 LTS Summary: Samba could be made to run programs as the administrator if it received specially crafted network traffic. Software Description: - samba: SMB/CIFS file, print, and login server for Unix Details: Brian Gorenc discovered that Samba incorrectly calculated array bounds when handling remote procedure calls (RPC) over the network. (CVE-2012-1182) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.10: samba 2:3.5.11~dfsg-1ubuntu2.2 Ubuntu 11.04: samba 2:3.5.8~dfsg-1ubuntu2.4 Ubuntu 10.04 LTS: samba 2:3.4.7~dfsg-1ubuntu3.9 Ubuntu 8.04 LTS: samba 3.0.28a-1ubuntu4.18 In general, a standard system update will make all the necessary changes

Trust: 7.56

sources: NVD: CVE-2012-1182 // JVNDB: JVNDB-2011-005032 // ZDI: ZDI-12-062 // ZDI: ZDI-12-072 // ZDI: ZDI-12-061 // ZDI: ZDI-12-070 // ZDI: ZDI-12-069 // ZDI: ZDI-12-064 // ZDI: ZDI-12-068 // ZDI: ZDI-12-071 // BID: 52973 // PACKETSTORM: 113904 // PACKETSTORM: 120435 // PACKETSTORM: 111735 // PACKETSTORM: 120441 // PACKETSTORM: 111837 // PACKETSTORM: 111839 // PACKETSTORM: 113552

AFFECTED PRODUCTS

vendor:sambamodel:3.6.xscope: - version: -

Trust: 5.6

vendor:sambamodel:sambascope:eqversion:3.0.5

Trust: 1.9

vendor:sambamodel:sambascope:eqversion:3.0.0

Trust: 1.9

vendor:sambamodel:sambascope:eqversion:3.0.3

Trust: 1.9

vendor:sambamodel:sambascope:eqversion:3.0.1

Trust: 1.9

vendor:sambamodel:sambascope:eqversion:3.0.2

Trust: 1.9

vendor:sambamodel:sambascope:eqversion:3.0.4

Trust: 1.9

vendor:sambamodel:sambascope:eqversion:3.0.6

Trust: 1.9

vendor:sambamodel:sambascope:eqversion:3.0.2a

Trust: 1.6

vendor:sambamodel:sambascope:eqversion:3.0.28

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.13

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.8

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.5.1

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.11

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.10

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.12

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.4

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.6.3

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.3

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.1

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.5.5

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.10

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.26

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.14

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.9

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.10

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.14

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.35

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.21

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.19

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.1

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.5

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.11

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.2

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.14

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.12

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.9

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.4

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.6.2

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.22

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.13

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.5.11

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.3

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.5.10

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.9

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.12

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.5.4

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.17

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.29

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.33

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.6

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.23

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.7

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.6.1

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.13

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.7

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.16

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.5.6

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.11

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.5.9

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.7

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.32

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.27

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.31

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.8

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.5.7

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.7

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.5.8

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.5.2

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.8

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.16

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.13

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.8

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.37

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.2

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.15

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.4

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.5.3

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.15

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.24

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.6

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.18

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.36

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.14

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.10

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.3

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.30

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.11

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.12

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.2

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.9

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.5

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.25

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.34

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.1

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.0.20

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.2.5

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.3.15

Trust: 1.3

vendor:sambamodel:sambascope:eqversion:3.4.6

Trust: 1.3

vendor:sambamodel:sambascope:lteversion:3.4.15

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.21a

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.2.0

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.21c

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.1.0

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.25b

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.3.0

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.26a

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.6.0

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.23d

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.25a

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.5.12

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.25c

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.23a

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.21b

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.14a

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.20a

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.20b

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.23b

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.4.0

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.5.0

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.5.13

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.0.23c

Trust: 1.0

vendor:sambamodel:sambascope:eqversion:3.6.4

Trust: 0.8

vendor:sambamodel:sambascope:eqversion:3.4.16

Trust: 0.8

vendor:sambamodel:sambascope:ltversion:3.6.x

Trust: 0.8

vendor:sambamodel:sambascope:ltversion:3.5.x

Trust: 0.8

vendor:sambamodel:sambascope:eqversion:3.5.14

Trust: 0.8

vendor:sambamodel:sambascope:ltversion:3.x

Trust: 0.8

vendor:sambamodel:cscope:eqversion:3.0.25

Trust: 0.6

vendor:sambamodel:ascope:eqversion:3.0.25

Trust: 0.6

vendor:sambamodel:bscope:eqversion:3.0.25

Trust: 0.6

vendor:ubuntumodel:linux i386scope:eqversion:11.10

Trust: 0.3

vendor:redmodel:hat enterprise linux eus 5.6.z serverscope: - version: -

Trust: 0.3

vendor:redmodel:hat enterprise linux long life serverscope:eqversion:5.3

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.0.0

Trust: 0.3

vendor:hpmodel:hp-ux b.11.23scope: - version: -

Trust: 0.3

vendor:sambamodel:3.0.23ascope: - version: -

Trust: 0.3

vendor:ibmmodel:scale out network attached storagescope:eqversion:1.3.0.4

Trust: 0.3

vendor:debianmodel:linux armscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.6

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp4scope:eqversion:10

Trust: 0.3

vendor:debianmodel:linux ia-64scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6.2

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp1scope:eqversion:11

Trust: 0.3

vendor:susemodel:linux enterprise server sp3 ltssscope:eqversion:10

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:5

Trust: 0.3

vendor:sambamodel:3.0.27ascope: - version: -

Trust: 0.3

vendor:sambamodel:bscope:eqversion:3.0.23

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.8

Trust: 0.3

vendor:sambamodel:sambascope:eqversion:3.5

Trust: 0.3

vendor:sambamodel:pre1scope:eqversion:3.0.25

Trust: 0.3

vendor:redmodel:hat enterprise linux server optionalscope:eqversion:6

Trust: 0.3

vendor:mandrakesoftmodel:enterprise serverscope:eqversion:5

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:neversion:v70001.3.1.0

Trust: 0.3

vendor:sambamodel:ascope:eqversion:3.0.2

Trust: 0.3

vendor:sambamodel:3.0.20bscope: - version: -

Trust: 0.3

vendor:sambamodel:sambascope:eqversion:3.3

Trust: 0.3

vendor:sambamodel:pre2scope:eqversion:3.0.25

Trust: 0.3

vendor:sambamodel:3.0.21bscope: - version: -

Trust: 0.3

vendor:sambamodel:3.0.21cscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.10

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.2

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.2

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.7

Trust: 0.3

vendor:ubuntumodel:linux lts amd64scope:eqversion:8.04

Trust: 0.3

vendor:sambamodel:sambascope:eqversion:3.6

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2011

Trust: 0.3

vendor:redmodel:hat enterprise linux workstation optionalscope:eqversion:6

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.4

Trust: 0.3

vendor:sambamodel:3.0.21ascope: - version: -

Trust: 0.3

vendor:researchmodel:in motion blackberry playbook tablet softwarescope:eqversion:1.0.8.4985

Trust: 0.3

vendor:ubuntumodel:linux lts powerpcscope:eqversion:8.04

Trust: 0.3

vendor:collaxmodel:business serverscope:eqversion:5.5

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:10.04

Trust: 0.3

vendor:sambamodel:rc3scope:eqversion:3.0.25

Trust: 0.3

vendor:researchmodel:in motion blackberry playbook tablet softwarescope:eqversion:1.0.5.2304

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop clientscope:eqversion:5

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp4scope:eqversion:10

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:10

Trust: 0.3

vendor:researchmodel:in motion blackberry playbook tablet softwarescope:eqversion:1.0.7.2942

Trust: 0.3

vendor:researchmodel:in motion blackberry playbook tablet softwarescope:eqversion:1.0.8.6067

Trust: 0.3

vendor:ubuntumodel:linux amd64scope:eqversion:11.04

Trust: 0.3

vendor:sambamodel:sambascope:eqversion:3.2

Trust: 0.3

vendor:sambamodel:cscope:eqversion:3.0.21

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc nodescope:eqversion:6

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.1

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp2scope:eqversion:11

Trust: 0.3

vendor:redhatmodel:enterprise linux esscope:eqversion:4

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.2

Trust: 0.3

vendor:researchmodel:in motion blackberry playbook tablet softwarescope:eqversion:1.0.7.3312

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:10.04

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.3

Trust: 0.3

vendor:ubuntumodel:linux lts sparcscope:eqversion:8.04

Trust: 0.3

vendor:debianmodel:linux sparcscope:eqversion:6.0

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.8

Trust: 0.3

vendor:ubuntumodel:linux lts i386scope:eqversion:8.04

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:11.4

Trust: 0.3

vendor:redmodel:hat enterprise linux hpc node optionalscope:eqversion:6

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.1

Trust: 0.3

vendor:sambamodel:3.0.23bscope: - version: -

Trust: 0.3

vendor:redmodel:hat enterprise linux server optional 6.0.zscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux i386scope:eqversion:11.04

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.2

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.1

Trust: 0.3

vendor:sambamodel:3.0.20ascope: - version: -

Trust: 0.3

vendor:sambamodel:ascope:eqversion:3.0.20

Trust: 0.3

vendor:sambamodel:dscope:eqversion:3.0.23

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:5

Trust: 0.3

vendor:susemodel:linux enterprise server sp1scope:eqversion:11

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.3

Trust: 0.3

vendor:sambamodel:ascope:eqversion:3.0.21

Trust: 0.3

vendor:ibmmodel:storwize unifiedscope:eqversion:v70001.3.0.5

Trust: 0.3

vendor:avayamodel:iqscope:eqversion:4.1

Trust: 0.3

vendor:susemodel:linux enterprise server gplv3 extrasscope:eqversion:10

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.2

Trust: 0.3

vendor:susemodel:linux enterprise server sp4scope:eqversion:10

Trust: 0.3

vendor:centosmodel:centosscope:eqversion:6

Trust: 0.3

vendor:ibmmodel:scale out network attached storagescope:neversion:1.3.0.5

Trust: 0.3

vendor:sambamodel:cscope:eqversion:3.0.23

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:6

Trust: 0.3

vendor:ubuntumodel:linux sparcscope:eqversion:10.04

Trust: 0.3

vendor:mandrivamodel:linux mandrake x86 64scope:eqversion:2010.1

Trust: 0.3

vendor:sunmodel:solaris 10 sparcscope: - version: -

Trust: 0.3

vendor:researchmodel:in motion blackberry playbook tablet softwarescope:eqversion:1.0.5.2342

Trust: 0.3

vendor:susemodel:linux enterprise server sp2scope:eqversion:11

Trust: 0.3

vendor:sambamodel:ascope:eqversion:3.0.28

Trust: 0.3

vendor:redmodel:hat enterprise linux workstationscope:eqversion:6

Trust: 0.3

vendor:susemodel:linux enterprise sdk sp2scope:eqversion:11

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:10.04

Trust: 0.3

vendor:gentoomodel:linuxscope: - version: -

Trust: 0.3

vendor:debianmodel:linux amd64scope:eqversion:6.0

Trust: 0.3

vendor:oraclemodel:enterprise linuxscope:eqversion:4

Trust: 0.3

vendor:redhatmodel:enterprise linux desktop workstation clientscope:eqversion:5

Trust: 0.3

vendor:sambamodel:bscope:eqversion:3.0.20

Trust: 0.3

vendor:sambamodel:ascope:eqversion:3.0.26

Trust: 0.3

vendor:avayamodel:ip office application serverscope:eqversion:8.0

Trust: 0.3

vendor:sambamodel:alphascope:eqversion:3.0

Trust: 0.3

vendor:sambamodel:rc2scope:eqversion:3.0.25

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2011

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.2

Trust: 0.3

vendor:ubuntumodel:linux lts lpiascope:eqversion:8.04

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:10.04

Trust: 0.3

vendor:ubuntumodel:linux powerpcscope:eqversion:11.04

Trust: 0.3

vendor:redmodel:hat enterprise linux server eusscope:eqversion:6.0

Trust: 0.3

vendor:sambamodel:-r1scope:eqversion:3.0.4

Trust: 0.3

vendor:sambamodel:3.0.14ascope: - version: -

Trust: 0.3

vendor:sambamodel:sambascope:eqversion:3.4

Trust: 0.3

vendor:sambamodel:sambascope:neversion:3.5.14

Trust: 0.3

vendor:debianmodel:linux ia-32scope:eqversion:6.0

Trust: 0.3

vendor:sunmodel:solarisscope:eqversion:11

Trust: 0.3

vendor:sambamodel:3.0.23dscope: - version: -

Trust: 0.3

vendor:ubuntumodel:linux armscope:eqversion:11.04

Trust: 0.3

vendor:debianmodel:linux mipsscope:eqversion:6.0

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.5

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.4

Trust: 0.3

vendor:ibmmodel:scale out network attached storagescope:eqversion:1.1

Trust: 0.3

vendor:sambamodel:sambascope:eqversion:3.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6

Trust: 0.3

vendor:susemodel:linux enterprise desktop sp1scope:eqversion:11

Trust: 0.3

vendor:researchmodel:in motion blackberry playbook tablet softwarescope:eqversion:1.0.6

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.0

Trust: 0.3

vendor:susemodel:linux enterprise server for vmware sp1scope:eqversion:11

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:5.2

Trust: 0.3

vendor:susemodel:opensusescope:eqversion:12.1

Trust: 0.3

vendor:sambamodel:ascope:eqversion:3.0.14

Trust: 0.3

vendor:sambamodel:rc1scope:eqversion:3.0.25

Trust: 0.3

vendor:redmodel:hat enterprise linux server eus 6.1.zscope: - version: -

Trust: 0.3

vendor:susemodel:linux enterprise server for vmware sp2scope:eqversion:11

Trust: 0.3

vendor:sambamodel:ascope:eqversion:3.0.27

Trust: 0.3

vendor:hpmodel:hp-ux b.11.31scope: - version: -

Trust: 0.3

vendor:avayamodel:aura system manager sp1scope:eqversion:6.1

Trust: 0.3

vendor:applemodel:mac osscope:eqversion:x10.6.1

Trust: 0.3

vendor:sunmodel:solaris 10 x86scope: - version: -

Trust: 0.3

vendor:sambamodel:3.0.26ascope: - version: -

Trust: 0.3

vendor:debianmodel:linux s/390scope:eqversion:6.0

Trust: 0.3

vendor:sambamodel:sambascope:neversion:3.6.4

Trust: 0.3

vendor:s u s emodel:corescope:eqversion:9

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2

Trust: 0.3

vendor:sambamodel:sambascope:neversion:3.4.16

Trust: 0.3

vendor:avayamodel:messaging storage server sp1scope:eqversion:5.2

Trust: 0.3

vendor:sambamodel:rc1scope:eqversion:3.0.4

Trust: 0.3

vendor:researchmodel:in motion blackberry playbook tablet softwarescope:eqversion:2.0.0.7971

Trust: 0.3

vendor:debianmodel:linux powerpcscope:eqversion:6.0

Trust: 0.3

vendor:sambamodel:3.0.23cscope: - version: -

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1

Trust: 0.3

vendor:redmodel:hat enterprise linux serverscope:eqversion:6

Trust: 0.3

vendor:avayamodel:aura system managerscope:eqversion:6.1.1

Trust: 0.3

vendor:collaxmodel:business serverscope:neversion:5.5.2

Trust: 0.3

vendor:sunmodel:solaris 9 x86scope: - version: -

Trust: 0.3

vendor:avayamodel:aura system manager sp2scope:eqversion:6.1

Trust: 0.3

vendor:sunmodel:solaris 9 sparcscope: - version: -

Trust: 0.3

vendor:avayamodel:messaging storage server sp3scope:eqversion:5.2

Trust: 0.3

vendor:sambamodel:bscope:eqversion:3.0.21

Trust: 0.3

vendor:redmodel:hat enterprise linux desktop optionalscope:eqversion:6

Trust: 0.3

vendor:mandrakesoftmodel:enterprise server x86 64scope:eqversion:5

Trust: 0.3

vendor:avayamodel:messaging storage serverscope:eqversion:5.2.2

Trust: 0.3

vendor:redmodel:hat enterprise linux desktopscope:eqversion:6

Trust: 0.3

vendor:sambamodel:ascope:eqversion:3.0.23

Trust: 0.3

vendor:redmodel:hat enterprise linux asscope:eqversion:4

Trust: 0.3

vendor:avayamodel:messaging storage server sp2scope:eqversion:5.1

Trust: 0.3

vendor:s u s emodel:suse core forscope:eqversion:9x86

Trust: 0.3

vendor:mandrivamodel:linux mandrakescope:eqversion:2010.1

Trust: 0.3

vendor:applemodel:mac os serverscope:eqversion:x10.6.3

Trust: 0.3

sources: ZDI: ZDI-12-071 // ZDI: ZDI-12-068 // ZDI: ZDI-12-062 // ZDI: ZDI-12-072 // ZDI: ZDI-12-061 // ZDI: ZDI-12-070 // ZDI: ZDI-12-069 // ZDI: ZDI-12-064 // BID: 52973 // JVNDB: JVNDB-2011-005032 // CNNVD: CNNVD-201204-130 // NVD: CVE-2012-1182

CVSS

SEVERITY

CVSSV2

CVSSV3

ZDI: CVE-2012-1182
value: HIGH

Trust: 5.6

nvd@nist.gov: CVE-2012-1182
value: HIGH

Trust: 1.0

NVD: CVE-2012-1182
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201204-130
value: CRITICAL

Trust: 0.6

nvd@nist.gov: CVE-2012-1182
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 7.4

sources: ZDI: ZDI-12-071 // ZDI: ZDI-12-068 // ZDI: ZDI-12-062 // ZDI: ZDI-12-072 // ZDI: ZDI-12-061 // ZDI: ZDI-12-070 // ZDI: ZDI-12-069 // ZDI: ZDI-12-064 // JVNDB: JVNDB-2011-005032 // CNNVD: CNNVD-201204-130 // NVD: CVE-2012-1182

PROBLEMTYPE DATA

problemtype:CWE-189

Trust: 1.8

sources: JVNDB: JVNDB-2011-005032 // NVD: CVE-2012-1182

THREAT TYPE

remote

Trust: 0.9

sources: PACKETSTORM: 111735 // PACKETSTORM: 111837 // PACKETSTORM: 111839 // CNNVD: CNNVD-201204-130

TYPE

digital error

Trust: 0.6

sources: CNNVD: CNNVD-201204-130

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-005032

PATCH

title:CVE-2012-1182url:https://www.samba.org/samba/security/CVE-2012-1182

Trust: 6.4

title:HT5281url:http://support.apple.com/kb/HT5281

Trust: 0.8

title:FEDORA-2012-6382url:http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html

Trust: 0.8

title:CVE-2012-1182url:https://access.redhat.com/security/cve/CVE-2012-1182

Trust: 0.8

title:RHSA-2012:0465-1 Critical: samba security updateurl:https://rhn.redhat.com/errata/RHSA-2012-0465.html

Trust: 0.8

title:RHSA-2012:0466-1 Critical: samba3x security updateurl:https://rhn.redhat.com/errata/RHSA-2012-0466.html

Trust: 0.8

title:CVE-2012-1182 Arbitrary code execution vulnerability in Sambaurl:https://blogs.oracle.com/sunsecurity/entry/cve_2012_1182_arbitrary_code

Trust: 0.8

title:USN-1423-1url:http://www.ubuntu.com/usn/USN-1423-1

Trust: 0.8

title:Samba-JP Wiki メインページurl:http://wiki.samba.gr.jp/mediawiki/index.php

Trust: 0.8

title:samba-3.4.16url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42873

Trust: 0.6

title:samba-3.5.14url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42872

Trust: 0.6

title:samba-3.6.4url:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=42871

Trust: 0.6

sources: ZDI: ZDI-12-071 // ZDI: ZDI-12-068 // ZDI: ZDI-12-062 // ZDI: ZDI-12-072 // ZDI: ZDI-12-061 // ZDI: ZDI-12-070 // ZDI: ZDI-12-069 // ZDI: ZDI-12-064 // JVNDB: JVNDB-2011-005032 // CNNVD: CNNVD-201204-130

EXTERNAL IDS

db:NVDid:CVE-2012-1182

Trust: 9.0

db:ZDIid:ZDI-12-071

Trust: 1.0

db:ZDIid:ZDI-12-068

Trust: 1.0

db:ZDIid:ZDI-12-062

Trust: 1.0

db:ZDIid:ZDI-12-072

Trust: 1.0

db:ZDIid:ZDI-12-061

Trust: 1.0

db:ZDIid:ZDI-12-070

Trust: 1.0

db:ZDIid:ZDI-12-069

Trust: 1.0

db:ZDIid:ZDI-12-064

Trust: 1.0

db:SECUNIAid:48844

Trust: 1.0

db:SECUNIAid:48751

Trust: 1.0

db:SECUNIAid:48999

Trust: 1.0

db:SECUNIAid:48873

Trust: 1.0

db:SECUNIAid:48879

Trust: 1.0

db:SECUNIAid:48818

Trust: 1.0

db:SECUNIAid:48754

Trust: 1.0

db:SECUNIAid:48816

Trust: 1.0

db:SECTRACKid:1026913

Trust: 1.0

db:JVNDBid:JVNDB-2011-005032

Trust: 0.8

db:ZDI_CANid:ZDI-CAN-1505

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1503

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1538

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1530

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1540

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1506

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1504

Trust: 0.7

db:ZDI_CANid:ZDI-CAN-1539

Trust: 0.7

db:NSFOCUSid:19335

Trust: 0.6

db:CNNVDid:CNNVD-201204-130

Trust: 0.6

db:ZDIid:ZDI-12-063

Trust: 0.3

db:BIDid:52973

Trust: 0.3

db:PACKETSTORMid:113904

Trust: 0.1

db:PACKETSTORMid:120435

Trust: 0.1

db:PACKETSTORMid:111735

Trust: 0.1

db:PACKETSTORMid:120441

Trust: 0.1

db:PACKETSTORMid:111837

Trust: 0.1

db:PACKETSTORMid:111839

Trust: 0.1

db:PACKETSTORMid:113552

Trust: 0.1

sources: ZDI: ZDI-12-071 // ZDI: ZDI-12-068 // ZDI: ZDI-12-062 // ZDI: ZDI-12-072 // ZDI: ZDI-12-061 // ZDI: ZDI-12-070 // ZDI: ZDI-12-069 // ZDI: ZDI-12-064 // BID: 52973 // JVNDB: JVNDB-2011-005032 // PACKETSTORM: 113904 // PACKETSTORM: 120435 // PACKETSTORM: 111735 // PACKETSTORM: 120441 // PACKETSTORM: 111837 // PACKETSTORM: 111839 // PACKETSTORM: 113552 // CNNVD: CNNVD-201204-130 // NVD: CVE-2012-1182

REFERENCES

url:https://www.samba.org/samba/security/cve-2012-1182

Trust: 7.5

url:http://www.samba.org/samba/history/samba-3.6.4.html

Trust: 1.3

url:http://www.ubuntu.com/usn/usn-1423-1

Trust: 1.1

url:http://lists.apple.com/archives/security-announce/2012/may/msg00001.html

Trust: 1.0

url:http://lists.fedoraproject.org/pipermail/package-announce/2012-april/078258.html

Trust: 1.0

url:http://lists.fedoraproject.org/pipermail/package-announce/2012-april/078726.html

Trust: 1.0

url:http://lists.fedoraproject.org/pipermail/package-announce/2012-april/078836.html

Trust: 1.0

url:http://lists.fedoraproject.org/pipermail/package-announce/2012-may/080567.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html

Trust: 1.0

url:http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=133951282306605&w=2

Trust: 1.0

url:http://marc.info/?l=bugtraq&m=134323086902585&w=2

Trust: 1.0

url:http://secunia.com/advisories/48751

Trust: 1.0

url:http://secunia.com/advisories/48754

Trust: 1.0

url:http://secunia.com/advisories/48816

Trust: 1.0

url:http://secunia.com/advisories/48818

Trust: 1.0

url:http://secunia.com/advisories/48844

Trust: 1.0

url:http://secunia.com/advisories/48873

Trust: 1.0

url:http://secunia.com/advisories/48879

Trust: 1.0

url:http://secunia.com/advisories/48999

Trust: 1.0

url:http://support.apple.com/kb/ht5281

Trust: 1.0

url:http://www.collax.com/produkte/allinone-server-for-small-businesses#id2565578

Trust: 1.0

url:http://www.debian.org/security/2012/dsa-2450

Trust: 1.0

url:http://www.mandriva.com/security/advisories?name=mdvsa-2012:055

Trust: 1.0

url:http://www.securitytracker.com/id?1026913

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1182

Trust: 0.8

url:http://jvn.jp/cert/jvnvu692779/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1182

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2012-1182

Trust: 0.7

url:http://www.nsfocus.net/vulndb/19335

Trust: 0.6

url:https://www.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://www.redhat.com/security/data/cve/cve-2012-1182.html

Trust: 0.4

url:https://access.redhat.com/security/team/key/#package

Trust: 0.4

url:http://bugzilla.redhat.com/):

Trust: 0.4

url:https://access.redhat.com/knowledge/articles/11258

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2012-1182

Trust: 0.3

url:http://www.collax.com/produkte/die-komplettloesung-fuer-kleine-unternehmen

Trust: 0.3

url:http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03365218&ac.admitted=1339650390917.876444892.492883150

Trust: 0.3

url:http://www.samba.org

Trust: 0.3

url:http://www-304.ibm.com/support/docview.wss?uid=ssg1s1004108

Trust: 0.3

url:http://www-304.ibm.com/support/docview.wss?uid=ssg1s1004109

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100161399

Trust: 0.3

url:https://downloads.avaya.com/css/p8/documents/100161830

Trust: 0.3

url:http://www.blackberry.com/btsc/kb32189

Trust: 0.3

url:https://blogs.oracle.com/sunsecurity/entry/cve_2012_1182_arbitrary_code

Trust: 0.3

url:http://www.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c03366886

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-12-061

Trust: 0.3

url:www.zerodayinitiative.com/advisories/zdi-12-062

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-12-063

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-12-064

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-12-068

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-12-069

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-12-070

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-12-071

Trust: 0.3

url:http://www.zerodayinitiative.com/advisories/zdi-12-072

Trust: 0.3

url:http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/

Trust: 0.2

url:http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins

Trust: 0.2

url:https://h20566.www2.hp.com/portal/site/hpsc/public/kb/

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#critical

Trust: 0.2

url:http://software.hp.com

Trust: 0.1

url:https://www.hp.com/go/swa

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2111

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2013-0506.html

Trust: 0.1

url:https://access.redhat.com/knowledge/docs/en-us/red_hat_enterprise_linux/6/html/6.4_release_notes/index.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2012-0465.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2013-0515.html

Trust: 0.1

url:https://rhn.redhat.com/errata/rhsa-2012-0478.html

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/samba/2:3.5.11~dfsg-1ubuntu2.2

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/samba/2:3.5.8~dfsg-1ubuntu2.4

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/samba/3.0.28a-1ubuntu4.18

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/samba/2:3.4.7~dfsg-1ubuntu3.9

Trust: 0.1

url:http://support.openview.hp.com/selfsolve/document/fid/documentum_srva_00127

Trust: 0.1

sources: ZDI: ZDI-12-071 // ZDI: ZDI-12-068 // ZDI: ZDI-12-062 // ZDI: ZDI-12-072 // ZDI: ZDI-12-061 // ZDI: ZDI-12-070 // ZDI: ZDI-12-069 // ZDI: ZDI-12-064 // BID: 52973 // JVNDB: JVNDB-2011-005032 // PACKETSTORM: 113904 // PACKETSTORM: 120435 // PACKETSTORM: 111735 // PACKETSTORM: 120441 // PACKETSTORM: 111837 // PACKETSTORM: 111839 // PACKETSTORM: 113552 // CNNVD: CNNVD-201204-130 // NVD: CVE-2012-1182

CREDITS

Anonymous

Trust: 5.6

sources: ZDI: ZDI-12-071 // ZDI: ZDI-12-068 // ZDI: ZDI-12-062 // ZDI: ZDI-12-072 // ZDI: ZDI-12-061 // ZDI: ZDI-12-070 // ZDI: ZDI-12-069 // ZDI: ZDI-12-064

SOURCES

db:ZDIid:ZDI-12-071
db:ZDIid:ZDI-12-068
db:ZDIid:ZDI-12-062
db:ZDIid:ZDI-12-072
db:ZDIid:ZDI-12-061
db:ZDIid:ZDI-12-070
db:ZDIid:ZDI-12-069
db:ZDIid:ZDI-12-064
db:BIDid:52973
db:JVNDBid:JVNDB-2011-005032
db:PACKETSTORMid:113904
db:PACKETSTORMid:120435
db:PACKETSTORMid:111735
db:PACKETSTORMid:120441
db:PACKETSTORMid:111837
db:PACKETSTORMid:111839
db:PACKETSTORMid:113552
db:CNNVDid:CNNVD-201204-130
db:NVDid:CVE-2012-1182

LAST UPDATE DATE

2024-11-20T21:55:13.868000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-12-071date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-068date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-062date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-072date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-061date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-070date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-069date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-064date:2012-04-18T00:00:00
db:BIDid:52973date:2015-04-13T21:38:00
db:JVNDBid:JVNDB-2011-005032date:2012-09-05T00:00:00
db:CNNVDid:CNNVD-201204-130date:2012-08-17T00:00:00
db:NVDid:CVE-2012-1182date:2018-10-30T16:25:59.730

SOURCES RELEASE DATE

db:ZDIid:ZDI-12-071date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-068date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-062date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-072date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-061date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-070date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-069date:2012-04-18T00:00:00
db:ZDIid:ZDI-12-064date:2012-04-18T00:00:00
db:BIDid:52973date:2012-04-10T00:00:00
db:JVNDBid:JVNDB-2011-005032date:2012-04-12T00:00:00
db:PACKETSTORMid:113904date:2012-06-19T18:18:00
db:PACKETSTORMid:120435date:2013-02-21T16:26:26
db:PACKETSTORMid:111735date:2012-04-11T14:20:53
db:PACKETSTORMid:120441date:2013-02-21T16:27:45
db:PACKETSTORMid:111837date:2012-04-13T19:35:18
db:PACKETSTORMid:111839date:2012-04-13T19:37:57
db:PACKETSTORMid:113552date:2012-06-12T21:58:42
db:CNNVDid:CNNVD-201204-130date:2012-04-11T00:00:00
db:NVDid:CVE-2012-1182date:2012-04-10T21:55:02.203