Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2004-632: samba


Vulnerability Assessment Details

RHSA-2004-632: samba

Vulnerability Assessment Summary
Check for the version of the samba packages

Detailed Explanation for this Vulnerability Assessment


Updated samba packages that fix various security vulnerabilities are now
available.

Samba provides file and printer sharing services to SMB/CIFS clients.

During a code audit, Stefan Esser discovered a buffer overflow in Samba
versions prior to 3.0.8 when handling unicode filenames. An authenticated
remote user could exploit this bug which may lead to arbitrary code
execution on the server. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2004-0882 to this issue. Red Hat
believes that the Exec-Shield technology (enabled by default since Update
3) will block attempts to remotely exploit this vulnerability on x86
architectures.

Additionally, a bug was found in the input validation routines in versions
of Samba prior to 3.0.8 that caused the smbd process to consume abnormal
amounts of system memory. An authenticated remote user could exploit this
bug to cause a denial of service. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2004-0930 to this issue.

Users of Samba should upgrade to these updated packages, which contain
backported security patches, and are not vulnerable to these issues.




Solution : http://rhn.redhat.com/errata/RHSA-2004-632.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

8GB (2x 4GB) Samsung 2Rx8 PC3-10600 Laptop DDR3 1333Mhz Memory RAM 1.5V SODIMM
$44.88
8GB (2x 4GB)  Samsung 2Rx8 PC3-10600 Laptop DDR3 1333Mhz Memory RAM 1.5V SODIMM pictureVerbatim - Water-Resistant Premiumplus 533X Sdxc Memory Card 256Gb 80Mbps
$163.42
Verbatim - Water-Resistant Premiumplus 533X Sdxc Memory Card 256Gb 80Mbps pictureSandisk Ultra SDHC Memory Card (16Gb), Class 10 performance for Full HD video
$17.35
Sandisk Ultra SDHC Memory Card (16Gb), Class 10 performance for Full HD video pictureTranscend 2GB DDR2-667Mhz PC2-5300 200Pin 2RX8 SODIMM Laptop Memory RAM Non-Ecc
$0.99
Transcend 2GB DDR2-667Mhz PC2-5300 200Pin 2RX8 SODIMM Laptop Memory RAM Non-Ecc picture


Discussions

No Discussions have been posted on this vulnerability.