![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.150745 |
Category: | General |
Title: | Samba 3.6.6 <= 4.1.7 Uninitialized Memory Exposure vulnerability (CVE-2014-0178) |
Summary: | Samba 3.6.6 to 4.1.7 are affected by a vulnerability that allows; an authenticated client to retrieve eight bytes of uninitialized server memory when a shadow-copy; VFS module is enabled. |
Description: | Summary: Samba 3.6.6 to 4.1.7 are affected by a vulnerability that allows an authenticated client to retrieve eight bytes of uninitialized server memory when a shadow-copy VFS module is enabled. Vulnerability Insight: In preparing a response to an authenticated FSCTL_GET_SHADOW_COPY_DATA or FSCTL_SRV_ENUMERATE_SNAPSHOTS client request, affected versions of Samba do not initialize 8 bytes of the 16 byte SRV_SNAPSHOT_ARRAY response field. The uninitialized buffer is sent back to the client. A non-default VFS module providing the get_shadow_copy_data_fn() hook must be explicitly enabled for Samba to process the aforementioned client requests. Therefore, only configurations with 'shadow_copy' or 'shadow_copy2' specified for the 'vfs objects' parameter are vulnerable. Affected Software/OS: Samba versions 3.6.6 through 4.1.7. Solution: Update to version 4.0.18, 4.1.8 or later. CVSS Score: 3.5 CVSS Vector: AV:N/AC:M/Au:S/C:P/I:N/A:N |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2014-0178 BugTraq ID: 67686 http://www.securityfocus.com/bid/67686 Bugtraq: 20140711 [ MDVSA-2014:136 ] samba (Google Search) http://www.securityfocus.com/archive/1/532757/100/0/threaded http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html http://security.gentoo.org/glsa/glsa-201502-15.xml http://www.mandriva.com/security/advisories?name=MDVSA-2014:136 http://www.mandriva.com/security/advisories?name=MDVSA-2015:082 http://www.securitytracker.com/id/1030308 http://secunia.com/advisories/59378 http://secunia.com/advisories/59407 http://secunia.com/advisories/59579 |
Copyright | Copyright (C) 2021 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |