Family: Mandrake Local Security Checks --> Category: infos
MDKA-2007:001: samba Vulnerability Scan
Vulnerability Scan Summary
Check for the version of the samba package
Detailed Explanation for this Vulnerability Test
The remote host is missing the patch for the advisory MDKA-2007:001 (samba).
A number of minor issues were present in the samba packages shipped
with Mandriva 2007.0. For users with filesystem quotas, samba would not
indicate the remaining quota as the free disk space (as intended).
Problems with storing accounts with upper-case usernames in the
smbpasswd passdb backend (tdbsam and ldapsam were not affected). Errors
in the pam.d file used in samba for pam 0.9x prevented pam
authentication (SWAT, and authentication to samba when using 'obey pam
restrictions = yes'). Users were being denied access to shares which
have a 'valid users' statement including a group the user is a member
These issues have all been fixed in the updated packages. Note that
some of these fixes were only available in a new upstream version of
samba, which also changes some behaviour. Please consult the release
notes (http://www.samba.org/samba/history/samba-3.0.23d.html) before
upgrading. Specifically, note the 'RID Algorithms & Passdb' if you use
samba as a file server in a domain context.
Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKA-2007:001
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.