Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the samba package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2004-284 (samba).
Samba is the protocol by which a lot of PC-related machines share
files, printers, and other information (such as lists of available
files and printers). The Windows NT, OS/2, and Linux operating systems
support this natively, and add-on packages can enable the same thing
for DOS, Windows, VMS, UNIX of all kinds, MVS, and more. This package
provides an SMB server that can be used to provide network services to
SMB (sometimes called 'Lan Manager') clients. Samba uses NetBIOS over
TCP/IP (NetBT) protocols and does NOT need the NetBEUI (Microsoft Raw
NetBIOS frame) protocol.
* Wed Aug 25 2004 Jay Fenlason
- Upgade to 3.0.6
include the following patches:
samba-3.0.5rc1-passwd.patch from me. This changes the character
used in the password field of the entries generated by winbind
from a 'x' to a '*'. 'x' means something special ('password is
in /etc/shadow') to another pam module.
Alexander Larsson (email@example.com). Make kerberized smbclient
samba-3.0.5pre1-use_authtok.patch from Nalin Dahyabhai
correct Cristian Gafton's name
samba-3.0.6-schema.patch from Gerald (Jerry) Carter
Correct the LDAP schema
samba-3.0.5rc1-64bit-timestamps.patch from Ravikumar
(firstname.lastname@example.org) to permit correct timestamp handling on 64-bit
platforms and fix #126109.
samba-3.0.4-install.mount.smbfs.patch from Juanjo Villaplana
(email@example.com) to prevent building the srpm from trashing
the installed /usr/bin/smbmount
* Thu May 20 2004 Jay Fenlason
- include -winbind patch from Gerald (Jerry) Carter (firstname.lastname@example.org)
to make winbindd work against Windows versions that do not have
128 bit encryption enabled.
Solution : http://www.fedoranews.org/updates/FEDORA-2004-284.shtml
Risk Factor : High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|FEBNISCTE USB 2.0 Swivel Flash Drive Memory Stick Pendrive , 128MB, Blue, Pack
|Cruzer Glide 128GB USB Flash Drive
|256GB Kanguru SS3 Flash - Electronics & computer
No Discussions have been posted on this vulnerability.