VID |
23223 |
Severity |
30 |
Port |
139 |
Protocol |
TCP |
Class |
Samba |
Detailed Description |
A version of Samba server which is older than 3.4.8 / 3.5.2 is detected as running on the host. Samba is an Open Source/Free Software package that provides seamless file and print services to SMB/CIFS clients. Samba versions prior to 3.4.8 / 3.5.2 affected by two denial of service vulnerabilities that can triggered via either a null pointer dereference or an uninitialized variable read. By sending specially crafted 'Session Setup AndX' requests, an unauthenticated remote attacker can exploit these vulnerabilities to crash the affected service, thereby denying service to legitimate users.
* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.
* References: http://archives.neohapsis.com/archives/fulldisclosure/2010-05/0146.html https://bugzilla.samba.org/show_bug.cgi?id=7229 https://bugzilla.samba.org/show_bug.cgi?id=7254 http://samba.org/samba/history/samba-3.4.8.html http://samba.org/samba/history/samba-3.5.2.html
* Platforms Affected: Samba Project, Samba versions prior to 3.4.8 / 3.5.2 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Samba (3.4.8 / 3.5.2 or later), available from the Samba Web site at http://us1.samba.org/samba/ |
Related URL |
CVE-2010-1635,CVE-2010-1642 (CVE) |
Related URL |
40097 (SecurityFocus) |
Related URL |
(ISS) |
|