Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:071: samba


Vulnerability Assessment Details

MDKSA-2004:071: samba

Vulnerability Assessment Summary
Check for the version of the samba package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:071 (samba).


A vulnerability was discovered in SWAT, the Samba Web Administration Tool. The
routine used to decode the base64 data during HTTP basic authentication is
subject to a buffer overrun caused by an invalid base64 character. This same
code is also used to internally decode the sambaMungedDial attribute value when
using the ldapsam passdb backend, and to decode input given to the ntlm_auth
tool.
This vulnerability only exists in Samba versions 3.0.2 or later
the 3.0.5
release fixes the vulnerability. Systems using SWAT, the ldapsam passdb backend,
and tose running winbindd and permiting third- party applications to issue
authentication requests via ntlm_auth tool should upgrade immediately.
(CVE-2004-0600)
A buffer overrun has been located in the code used to support the 'mangling
method = hash' smb.conf option. Please be aware that the default setting for
this parameter is 'mangling method = hash2' and therefore not vulnerable. This
bug is present in Samba 3.0.0 and later, as well as Samba 2.2.X (CVE-2004-0686)
This update also fixes a bug where attempting to print in some cases would cause
smbd to exit with a signal 11.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:071
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

DELL POWEREDGE R730XD SERVER 24 BAY TWO E5-2637V3 3.5GHZ 192GB 8 X 1TB SATA NO H
$6989.0
DELL POWEREDGE R730XD SERVER 24 BAY TWO E5-2637V3 3.5GHZ 192GB 8 X 1TB SATA NO H pictureDELL POWEREDGE R730XD SERVER 24 BAY E5-2640V3 2.6GHZ 64GB 6 X 1TB SATA NO HDD H7
$4349.0
DELL POWEREDGE R730XD SERVER 24 BAY E5-2640V3 2.6GHZ 64GB 6 X 1TB SATA NO HDD H7 pictureHP Z840 NO OS TWO E5-2698V4 2.2GHZ 64GB 1TB SATA QUADRO K5200 8GB
$9629.0
HP Z840 NO OS TWO E5-2698V4 2.2GHZ 64GB 1TB SATA QUADRO K5200 8GB pictureDELL POWEREDGE R730XD SERVER 12 BAY E5-2630LV3 1.8GHZ 256GB 4 X 1TB SATA H730
$6139.0
DELL POWEREDGE R730XD SERVER 12 BAY E5-2630LV3 1.8GHZ 256GB 4 X 1TB SATA H730 picture


Discussions

No Discussions have been posted on this vulnerability.