Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKA-2007:001: samba


Vulnerability Assessment Details

MDKA-2007:001: samba

Vulnerability Assessment Summary
Check for the version of the samba package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKA-2007:001 (samba).

A number of minor issues were present in the samba packages shipped
with Mandriva 2007.0. For users with filesystem quotas, samba would not
indicate the remaining quota as the free disk space (as intended).
Problems with storing accounts with upper-case usernames in the
smbpasswd passdb backend (tdbsam and ldapsam were not affected). Errors
in the pam.d file used in samba for pam 0.9x prevented pam
authentication (SWAT, and authentication to samba when using 'obey pam
restrictions = yes'). Users were being denied access to shares which
have a 'valid users' statement including a group the user is a member
of.
These issues have all been fixed in the updated packages. Note that
some of these fixes were only available in a new upstream version of
samba, which also changes some behaviour. Please consult the release
notes (http://www.samba.org/samba/history/samba-3.0.23d.html) before
upgrading. Specifically, note the 'RID Algorithms & Passdb' if you use
samba as a file server in a domain context.

Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKA-2007:001
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

Dell R620 Dual E5-2680 v2 10C 2.8GHz 192GB 6x 600GB, 2x 400GB SSD 8 Bay
$3638.0
Dell R620 Dual E5-2680 v2 10C 2.8GHz 192GB 6x 600GB, 2x 400GB SSD 8 Bay pictureDell PowerEdge R720 Dual E5-2609 QC 2.4GHz 384GB 2x 300GB SAS 8 Bay 2.5in li
$2467.0
Dell PowerEdge R720 Dual E5-2609 QC 2.4GHz 384GB 2x 300GB SAS 8 Bay 2.5in li pictureDell PowerEdge R620 Dual E5-2680 v2 10 Core 2.8GHz 96GB 8x 300GB 15K SAS 8 Bay
$2788.0
Dell PowerEdge R620 Dual E5-2680 v2 10 Core 2.8GHz 96GB 8x 300GB 15K SAS 8 Bay pictureDell PowerEdge R720 Server Dual E5-2609 QC 2.4GHz 32GB 8x 1TB 3.5in 8 Bay
$1899.0
Dell PowerEdge R720 Server Dual E5-2609 QC 2.4GHz 32GB 8x 1TB 3.5in 8 Bay picture


Discussions

No Discussions have been posted on this vulnerability.