| VID |
23025 |
| Severity |
40 |
| Port |
139 |
| Protocol |
TCP |
| Class |
Samba |
| Detailed Description |
The Samba server, according to its version number, may be vulnerable to a buffer overflow attack. Reportedly, a buffer overflow condition may arise due to improper termination of memory structures used by Samba. As this is a buffer overflow vulnerability, it may be possible for an attacker to cause Samba server to execute arbitrary code.
* Note: This check item solely relied on the version of the remote Samba server to assess this vulnerability, so this might be a false positive.
Platforms Affected: - Samba 2.2.4 |
| Recommendation |
Upgrade to the latest version (2.2.5 or later) of Samba, available from: http://us1.samba.org/samba/ftp/samba-2.2.5.tar.gz |
| Related URL |
CVE-2002-2196 (CVE) |
| Related URL |
5587 (SecurityFocus) |
| Related URL |
10010 (ISS) |
|