Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.880727
Categoría:CentOS Local Security Checks
Título:CentOS Update for samba CESA-2009:1529 centos5 i386
Resumen:The remote host is missing an update for the 'samba'; package(s) announced via the referenced advisory.
Descripción:Summary:
The remote host is missing an update for the 'samba'
package(s) announced via the referenced advisory.

Vulnerability Insight:
Samba is a suite of programs used by machines to share files, printers, and
other information.

A denial of service flaw was found in the Samba smbd daemon. An
authenticated, remote user could send a specially-crafted response that
would cause an smbd child process to enter an infinite loop. An
authenticated, remote user could use this flaw to exhaust system resources
by opening multiple CIFS sessions. (CVE-2009-2906)

An uninitialized data access flaw was discovered in the smbd daemon when
using the non-default 'dos filemode' configuration option in 'smb.conf'. An
authenticated, remote user with write access to a file could possibly use
this flaw to change an access control list for that file, even when such
access should have been denied. (CVE-2009-1888)

A flaw was discovered in the way Samba handled users without a home
directory set in the back-end password database (e.g. '/etc/passwd'). If a
share for the home directory of such a user was created (e.g. using the
automated '[homes]' share), any user able to access that share could see
the whole file system, possibly bypassing intended access restrictions.
(CVE-2009-2813)

The mount.cifs program printed CIFS passwords as part of its debug output
when running in verbose mode. When mount.cifs had the setuid bit set, a
local, unprivileged user could use this flaw to disclose passwords from a
file that would otherwise be inaccessible to that user. Note: mount.cifs
from the samba packages distributed by Red Hat does not have the setuid bit
set. This flaw only affected systems where the setuid bit was manually set
by an administrator. (CVE-2009-2948)

Users of Samba should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing this update,
the smb service will be restarted automatically.

Affected Software/OS:
samba on CentOS 5

Solution:
Please install the updated packages.

CVSS Score:
6.0

CVSS Vector:
AV:N/AC:M/Au:S/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2009-1888
1022442
http://www.securitytracker.com/id?1022442
20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat
http://www.securityfocus.com/archive/1/507856/100/0/threaded
35472
http://www.securityfocus.com/bid/35472
35539
http://secunia.com/advisories/35539
35573
http://secunia.com/advisories/35573
35606
http://secunia.com/advisories/35606
36918
http://secunia.com/advisories/36918
ADV-2009-1664
http://www.vupen.com/english/advisories/2009/1664
DSA-1823
http://www.debian.org/security/2009/dsa-1823
MDVSA-2009:196
http://www.mandriva.com/security/advisories?name=MDVSA-2009:196
SSA:2009-177-01
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.521591
USN-839-1
http://www.ubuntu.com/usn/USN-839-1
http://wiki.rpath.com/Advisories:rPSA-2009-0145
http://www.samba.org/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch
http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch
http://www.samba.org/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch
http://www.samba.org/samba/security/CVE-2009-1888.html
oval:org.mitre.oval:def:10790
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10790
oval:org.mitre.oval:def:7292
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7292
samba-acl-security-bypass(51327)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51327
Common Vulnerability Exposure (CVE) ID: CVE-2009-2813
http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
BugTraq ID: 36363
http://www.securityfocus.com/bid/36363
Bugtraq: 20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat (Google Search)
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html
HPdes Security Advisory: HPSBUX02479
http://marc.info/?l=bugtraq&m=126514298313071&w=2
HPdes Security Advisory: SSRT090212
http://osvdb.org/57955
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191
http://secunia.com/advisories/36701
http://secunia.com/advisories/36893
http://secunia.com/advisories/36937
http://secunia.com/advisories/36953
http://secunia.com/advisories/37428
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1
SuSE Security Announcement: SUSE-SR:2009:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
http://www.vupen.com/english/advisories/2009/2810
XForce ISS Database: macosx-smb-security-bypass(53174)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53174
Common Vulnerability Exposure (CVE) ID: CVE-2009-2906
1021111
1022976
http://www.securitytracker.com/id?1022976
36573
http://www.securityfocus.com/bid/36573
36893
36937
36953
37428
58519
http://osvdb.org/58519
ADV-2009-2810
APPLE-SA-2010-03-29-1
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
FEDORA-2009-10172
FEDORA-2009-10180
SSA:2009-276-01
SUSE-SR:2009:017
http://news.samba.org/releases/3.0.37/
http://news.samba.org/releases/3.2.15/
http://news.samba.org/releases/3.3.8/
http://news.samba.org/releases/3.4.2/
http://samba.org/samba/security/CVE-2009-2906.html
http://support.apple.com/kb/HT4077
oval:org.mitre.oval:def:7090
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7090
oval:org.mitre.oval:def:9944
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944
samba-smb-dos(53575)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53575
Common Vulnerability Exposure (CVE) ID: CVE-2009-2948
BugTraq ID: 36572
http://www.securityfocus.com/bid/36572
http://osvdb.org/58520
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10434
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7087
http://www.securitytracker.com/id?1022975
XForce ISS Database: samba-mountcifs-info-disclosure(53574)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53574
CopyrightCopyright (C) 2011 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.