VID |
23234 |
Severity |
20 |
Port |
139 |
Protocol |
TCP |
Class |
Samba |
Detailed Description |
According to its banner, the version of Samba 3.x running on the remote host is earlier than 3.5.22 / 3.6.17 / 4.0.8. As such, it is potentially affected by a denial of service vulnerability.
An integer overflow error exists in the function 'read_nttrans_ea_lis' in the file 'nttrans.c' that could allow denial of service attacks to be carried out via specially crafted network traffic.
* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.
* References: http://www.samba.org/samba/security/CVE-2013-4124 http://www.samba.org/samba/history/samba-3.5.22.html http://www.samba.org/samba/history/samba-3.6.17.html http://www.samba.org/samba/history/samba-4.0.8.html
* Platforms Affected: Samba Project, Samba versions before 3.5.22 / 3.6.17 / 4.0.8 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Samba 3.5.22 / 3.6.17 / 4.0.8 or later, available from the Samba Web site at http://www.samba.org/samba/ |
Related URL |
CVE-2013-4124 (CVE) |
Related URL |
61597 (SecurityFocus) |
Related URL |
(ISS) |
|