| VID |
23291 |
| Severity |
40 |
| Port |
139 |
| Protocol |
TCP |
| Class |
Samba |
| Detailed Description |
The version of Samba running on the remote host is prior to 3.4.0. It is, therefore, affected by a remote code execution vulnerability in process.c due to a heap-based buffer overflow. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands via Batched / AndX request.
* References: https://www.samba.org/samba/security/CVE-2012-0870.html * Platforms Affected: Samba Project, Samba versions 3.x before 3.4.0 Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of Samba 3.4.0 or later, available from the Samba Web site at https://www.samba.org/samba/download/ |
| Related URL |
CVE-2012-0870 (CVE) |
| Related URL |
52103 (SecurityFocus) |
| Related URL |
(ISS) |
|