Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.150726
Category:General
Title:Samba 3.0.25 <= 3.0.25c Vulnerability (CVE-2007-4138)
Summary:Incorrect primary group assignment domain users using the; rfc2307 or sfu winbind nss info plugin.
Description:Summary:
Incorrect primary group assignment domain users using the
rfc2307 or sfu winbind nss info plugin.

Vulnerability Insight:
The idmap_ad.so library provides an nss_info extension to Winbind
for retrieving a user's home directory path, login shell and
primary group id from an Active Directory domain controller. This
functionality is enabled by defining the 'winbind nss info'
smb.conf option to either 'sfu' or 'rfc2307'.

Both the Windows 'Identity Management for Unix' and 'Services for
Unix' MMC plug-ins allow a user to be assigned a primary group
for Unix clients that differs from the user's Windows primary group.
When the rfc2307 or sfu nss_info plugin has been enabled, in
the absence of either the RFC2307 or SFU primary group attribute,
Winbind will assign a primary group ID of 0 to the domain user
queried using the getpwnam() C library call.

Affected Software/OS:
Samba versions 3.0.25 through 3.0.25c.

Solution:
Update to version 3.0.26 or later.

CVSS Score:
6.9

CVSS Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-4138
1018681
http://www.securitytracker.com/id?1018681
20070911 [SECURITY] Winbind's rfc2307 & SFU nss_info plugin in Samba 3.0.25[a-c] assigns users a primary gid of 0 by default
http://www.securityfocus.com/archive/1/479078/100/0/threaded
25636
http://www.securityfocus.com/bid/25636
26764
http://secunia.com/advisories/26764
26776
http://secunia.com/advisories/26776
26795
http://secunia.com/advisories/26795
26834
http://secunia.com/advisories/26834
3135
http://securityreason.com/securityalert/3135
ADV-2007-3120
http://www.vupen.com/english/advisories/2007/3120
FEDORA-2007-2145
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00201.html
RHSA-2007:1016
http://www.redhat.com/support/errata/RHSA-2007-1016.html
RHSA-2007:1017
http://www.redhat.com/support/errata/RHSA-2007-1017.html
SSA:2007-255-02
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.419439
TA07-352A
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
http://docs.info.apple.com/article.html?artnum=307179
http://www.samba.org/samba/security/CVE-2007-4138.html
https://issues.rpath.com/browse/RPL-1705
oval:org.mitre.oval:def:10375
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10375
samba-smb-privilege-escalation(36560)
https://exchange.xforce.ibmcloud.com/vulnerabilities/36560
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.