Korean
<< Back
VID 23204
Severity 40
Port 139
Protocol TCP
Class Samba
Detailed Description A version of Samba server which is older than 3.0.27 is detected as running on the host. Samba is an Open Source/Free Software package that provides seamless file and print services to SMB/CIFS clients. Samba versions 3.0.x prior to 3.0.27 are vulnerable to multiple buffer overflow and remote command injection vulnerabilities as follows:

- Stack buffer overflow in nmbd's logon request processing (CVE-2007-4572)
- Remote code execution in Samba's WINS server daemon (nmbd) when processing name registration followed by name query requests (CVE-2007-5398)

* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.

* References:
http://us1.samba.org/samba/security/CVE-2007-4572.html
http://us1.samba.org/samba/security/CVE-2007-5398.html
http://www.securityfocus.com/archive/1/483744
http://www.securityfocus.com/archive/1/483742
http://www.securityfocus.com/archive/1/483743
http://secunia.com/secunia_research/2007-90/advisory/
http://www.frsirt.com/english/advisories/2007/3869

* Platforms Affected:
Samba Project, Samba versions 3.0.x prior to 3.0.27
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of Samba (3.0.27 or later), available from the Samba Web site at http://us1.samba.org/samba/
Related URL CVE-2007-4572,CVE-2007-5398 (CVE)
Related URL 26454,26455 (SecurityFocus)
Related URL 38501,38502 (ISS)