Korean
<< Back
VID 23028
Severity 40
Port 139
Protocol TCP
Class Samba
Detailed Description The Samba server, according to its version number, has a bug in the length checking for encrypted password change requests from clients. A client could potentially send an encrypted password, which, when decrypted with the old hashed password could be used as a buffer overrun attack on the stack of smbd. This flaw allows remote attackers to gain root access on the target machine.
As of November 2002, this vulnerability is reported only for some Linux OS.

* Note: This check item solely relied on the version of the remote Samba server to assess this vulnerability, so this might be a false positive.

* Platforms Affected:
Samba 2.2.2 ~ 2.2.6
Red Hat Linux 7.3 - i386
Red Hat Linux 8.0 - i386

* References:
http://online.securityfocus.com/bid/6210
http://www.iss.net/security_center/static/10683.php
Recommendation Upgrade to the latest version (2.2.7 or later) of Samba, available from:
http://us1.samba.org/samba/ftp/samba-2.2.7.tar.gz
Related URL CVE-2002-1318 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)