VID |
23229 |
Severity |
20 |
Port |
139 |
Protocol |
TCP |
Class |
Samba |
Detailed Description |
According to its banner, the version of Samba 4.x running on the remote host is earlier than 4.0.1, and is, therefore, potentially affected by a security bypass vulnerability.
When acting as an Active Directory (AD) Domain Controller (DC), the application can improperly grant write access to an LDAP directory object or its attributes improperly. This error can be triggered when a user or group is granted any access to an LDAP directory object based on objectClass or is granted write access to any attribute on the object.
* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.
* References: http://www.samba.org/samba/security/CVE-2013-0172 http://www.samba.org/samba/history/samba-4.0.1.html http://ftp.samba.org/pub/samba/patches/security/samba-4.0.0-CVE-2013-0172.patch
* Platforms Affected: Samba Project, Samba versions 4.x before 4.0.1 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Samba 4.0.1 or later, available from the Samba Web site at http://us1.samba.org/samba/ |
Related URL |
CVE-2013-0172 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|