Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: Mandrake Local Security Checks --> Category: infos

MDKSA-2004:071: samba Vulnerability Scan


Vulnerability Scan Summary
Check for the version of the samba package

Detailed Explanation for this Vulnerability Test

The remote host is missing the patch for the advisory MDKSA-2004:071 (samba).


A vulnerability was discovered in SWAT, the Samba Web Administration Tool. The
routine used to decode the base64 data during HTTP basic authentication is
subject to a buffer overrun caused by an invalid base64 character. This same
code is also used to internally decode the sambaMungedDial attribute value when
using the ldapsam passdb backend, and to decode input given to the ntlm_auth
tool.
This vulnerability only exists in Samba versions 3.0.2 or later
the 3.0.5
release fixes the vulnerability. Systems using SWAT, the ldapsam passdb backend,
and tose running winbindd and allowing third- party applications to issue
authentication requests via ntlm_auth tool should upgrade immediately.
(CVE-2004-0600)
A buffer overrun has been located in the code used to support the 'mangling
method = hash' smb.conf option. Please be aware that the default setting for
this parameter is 'mangling method = hash2' and therefore not vulnerable. This
bug is present in Samba 3.0.0 and later, as well as Samba 2.2.X (CVE-2004-0686)
This update also fixes a bug where attempting to print in some cases would cause
smbd to exit with a signal 11.


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:071
Threat Level: High

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.