Korean
<< Back
VID 23214
Severity 40
Port 139
Protocol TCP
Class Samba
Detailed Description A version of Samba server which is older than 3.0.30 is detected as running on the host. Samba is an Open Source/Free Software package that provides seamless file and print services to SMB/CIFS clients. Samba versions prior to 3.0.30 are vulnerable to a heap-based buffer overflow vulnerability, caused by improper bounds checking in 'nmbd' within the 'receive_smb_raw' function in 'lib/util_sock.c' when parsing SMB packets received in a client context. By tricking a user into connecting to a malicious server (e.g. by clicking an "smb://" link) or by sending specially-crafted packets to an 'nmbd' server configured as a local or domain master browser, a remote attacker could execute arbitrary code on the system or cause the affected server to crash.
* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.

* References:
http://www.samba.org/samba/security/CVE-2008-1105.html
http://www.securityfocus.com/archive/1/archive/1/492683/100/0/threaded
http://www.frsirt.com/english/advisories/2008/1681
http://www.milw0rm.com/exploits/5712
http://securitytracker.com/id?1020123
http://secunia.com/advisories/30228

* Platforms Affected:
Samba Project, Samba versions prior to 3.0.30
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of Samba (3.0.30 or later), available from the Samba Web site at http://us1.samba.org/samba/
Related URL CVE-2008-1105 (CVE)
Related URL 29404 (SecurityFocus)
Related URL 42664 (ISS)