VID |
23196 |
Severity |
40 |
Port |
139 |
Protocol |
TCP |
Class |
Samba |
Detailed Description |
A version of Samba server which is older than 3.0.25 is detected as running on the host. Samba is an Open Source/Free Software package that provides seamless file and print services to SMB/CIFS clients. Samba versions 3.0.x prior to 3.0.25 are vulnerable to multiple buffer overflow and remote command injection vulnerabilities as follows:
- Local SID/Name translation bug (CVE-2007-2444) :Privilege Escalation - Multiple heap overflows (CVE-2007-2446) :Remote Code Execution - Unescaped user input parameters (CVE-2007-2447) :Remote Command Execution
* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.
* References: http://www.samba.org/samba/security/CVE-2007-2444.html http://www.samba.org/samba/security/CVE-2007-2446.html http://www.samba.org/samba/security/CVE-2007-2447.html http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534 http://www.zerodayinitiative.com/advisories/ZDI-07-029.html http://www.zerodayinitiative.com/advisories/ZDI-07-030.html http://www.zerodayinitiative.com/advisories/ZDI-07-031.html http://www.zerodayinitiative.com/advisories/ZDI-07-032.html http://www.zerodayinitiative.com/advisories/ZDI-07-033.html http://www.kb.cert.org/vuls/id/268336 http://www.kb.cert.org/vuls/id/773720 http://secunia.com/advisories/25232/
* Platforms Affected: Samba Project, Samba versions 3.0.x prior to 3.0.25 Samba Project, Samba versions 3.0.25pre(0~2) Samba Project, Samba versions 3.0.25rc(0~3) Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Samba (3.0.25 or later), available from the Samba Web site at http://us1.samba.org/samba/ |
Related URL |
CVE-2007-2444,CVE-2007-2446,CVE-2007-2447 (CVE) |
Related URL |
23972,23973,23974,24195,24196,24197,24198 (SecurityFocus) |
Related URL |
34307,34309,34311,34312,34314,34315,34316 (ISS) |
|