Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:104: samba


Vulnerability Assessment Details

MDKSA-2004:104: samba

Vulnerability Assessment Summary
Check for the version of the samba package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:104 (samba).


Karol Wiesek discovered a bug in the input validation routines used to convert
DOS path names to path names on the Samba host's file system. This bug can be
exploited to gain access to files outside of the share's path as defined in the
smb.conf configuration file. This vulnerability exists in all samba 2.2.x
versions up to and including 2.2.11 and also in samba 3.0.x up to and including
3.0.5.
The updated packages have been patched to correct this issue.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:104
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

ASUS P8P67-M Motherboard LGA 1155/Socket H2 Intel P67 DDR3
$74.85
ASUS P8P67-M Motherboard LGA 1155/Socket H2 Intel P67 DDR3  pictureFor HP 6460b Laptop Motherboard 642753-001 Intel CPU 100% tested OK
$58.0
For HP 6460b Laptop Motherboard 642753-001 Intel CPU 100% tested OK pictureDell Inspiron M5040 15.6" Genuine Laptop AMD E-450 Motherboard XP35R
$55.67
Dell Inspiron M5040 15.6ASUS ROG MAXIMUS VII FORMULA LGA 1150 ATX Intel Motherboard
$400.0
ASUS ROG MAXIMUS VII FORMULA LGA 1150 ATX Intel Motherboard picture


Discussions

No Discussions have been posted on this vulnerability.