Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the samba package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2004-284 (samba).
Samba is the protocol by which a lot of PC-related machines share
files, printers, and other information (such as lists of available
files and printers). The Windows NT, OS/2, and Linux operating systems
support this natively, and add-on packages can enable the same thing
for DOS, Windows, VMS, UNIX of all kinds, MVS, and more. This package
provides an SMB server that can be used to provide network services to
SMB (sometimes called 'Lan Manager') clients. Samba uses NetBIOS over
TCP/IP (NetBT) protocols and does NOT need the NetBEUI (Microsoft Raw
NetBIOS frame) protocol.
* Wed Aug 25 2004 Jay Fenlason
- Upgade to 3.0.6
include the following patches:
samba-3.0.5rc1-passwd.patch from me. This changes the character
used in the password field of the entries generated by winbind
from a 'x' to a '*'. 'x' means something special ('password is
in /etc/shadow') to another pam module.
Alexander Larsson (email@example.com). Make kerberized smbclient
samba-3.0.5pre1-use_authtok.patch from Nalin Dahyabhai
correct Cristian Gafton's name
samba-3.0.6-schema.patch from Gerald (Jerry) Carter
Correct the LDAP schema
samba-3.0.5rc1-64bit-timestamps.patch from Ravikumar
(firstname.lastname@example.org) to permit correct timestamp handling on 64-bit
platforms and fix #126109.
samba-3.0.4-install.mount.smbfs.patch from Juanjo Villaplana
(email@example.com) to prevent building the srpm from trashing
the installed /usr/bin/smbmount
* Thu May 20 2004 Jay Fenlason
- include -winbind patch from Gerald (Jerry) Carter (firstname.lastname@example.org)
to make winbindd work against Windows versions that do not have
128 bit encryption enabled.
Solution : http://www.fedoranews.org/updates/FEDORA-2004-284.shtml
Risk Factor : High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|Low Power Consumption HP DL380 G6 12-Core L5640 96GB 3x 160GB SSD 13x 500GB SAS
|DELL POWEREDGE R520 SERVER E5-2407V2 2.4GHZ 64GB 8 X 146GB 15K SAS H310
|DELL POWEREDGE R520 SERVER E5-2403 1.80GHZ 16GB 6 X 4TB SAS H710P
|HPE PROLIANT DL160 G9 Gen9 SERVER TWO E5-2660V3 2.6GHZ 384GB 3 X 500GB 6G SATA
No Discussions have been posted on this vulnerability.