Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the samba package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2004-284 (samba).
Samba is the protocol by which a lot of PC-related machines share
files, printers, and other information (such as lists of available
files and printers). The Windows NT, OS/2, and Linux operating systems
support this natively, and add-on packages can enable the same thing
for DOS, Windows, VMS, UNIX of all kinds, MVS, and more. This package
provides an SMB server that can be used to provide network services to
SMB (sometimes called 'Lan Manager') clients. Samba uses NetBIOS over
TCP/IP (NetBT) protocols and does NOT need the NetBEUI (Microsoft Raw
NetBIOS frame) protocol.
* Wed Aug 25 2004 Jay Fenlason
- Upgade to 3.0.6
include the following patches:
samba-3.0.5rc1-passwd.patch from me. This changes the character
used in the password field of the entries generated by winbind
from a 'x' to a '*'. 'x' means something special ('password is
in /etc/shadow') to another pam module.
Alexander Larsson (email@example.com). Make kerberized smbclient
samba-3.0.5pre1-use_authtok.patch from Nalin Dahyabhai
correct Cristian Gafton's name
samba-3.0.6-schema.patch from Gerald (Jerry) Carter
Correct the LDAP schema
samba-3.0.5rc1-64bit-timestamps.patch from Ravikumar
(firstname.lastname@example.org) to permit correct timestamp handling on 64-bit
platforms and fix #126109.
samba-3.0.4-install.mount.smbfs.patch from Juanjo Villaplana
(email@example.com) to prevent building the srpm from trashing
the installed /usr/bin/smbmount
* Thu May 20 2004 Jay Fenlason
- include -winbind patch from Gerald (Jerry) Carter (firstname.lastname@example.org)
to make winbindd work against Windows versions that do not have
128 bit encryption enabled.
Solution : http://www.fedoranews.org/updates/FEDORA-2004-284.shtml
Risk Factor : High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|Juniper SCB-MX960-S Switch Control Board SCB-MX
|EX-PWR-930-AC Juniper Networks 930W Power Supply PSU Rev B 740-035875 for EX4200
|Juniper Networks EX3300-24T 24 Gigabit Ports +4 10Gb SFP Ports Ethernet Switch
|Lot of 20 Juniper WLA532 Wireless LAN Access Points
No Discussions have been posted on this vulnerability.