Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2006:120: samba


Vulnerability Assessment Details

MDKSA-2006:120: samba

Vulnerability Assessment Summary
Check for the version of the samba package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2006:120 (samba).



A vulnerability in samba 3.0.x was discovered where a possible hacker could

cause a single smbd process to bloat, exhausting memory on the system.

This bug is caused by continually increasing the size of an array which

maintains state information about the number of active share

connections.



Updated packages have been patched to correct this issue.



Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:120
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2006 Tenable Network Security

Cables, Connectors

AT&T Mail Access PLUS for Windows Version 2.3 Vintage Floppy Discs 1992
$9.58
AT&T Mail Access PLUS for Windows Version 2.3 Vintage Floppy Discs 1992  pictureVintage MSI MS4125 Socket 2 Motherboard ISA / VLB / RAM / Cache + 33MHZ i486DX
$99.99
Vintage MSI MS4125 Socket 2 Motherboard ISA / VLB / RAM / Cache + 33MHZ  i486DX pictureVintage  Wang 600 14TP (see pics) Ships Worldwide
$1659.99
Vintage  Wang 600  14TP   (see pics) Ships Worldwide pictureVintage Apple Computer MAGIC '95 T-shirts L size Macintosh Promo Novelty NOS
$79.0
Vintage Apple Computer MAGIC '95 T-shirts L size Macintosh Promo Novelty NOS picture


Discussions

No Discussions have been posted on this vulnerability.