Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.53540
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-701-1)
Summary:The remote host is missing an update for the Debian 'samba' package(s) announced via the DSA-701-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'samba' package(s) announced via the DSA-701-1 advisory.

Vulnerability Insight:
It has been discovered that the last security update for Samba, a LanManager like file and printer server for GNU/Linux and Unix-like systems caused the daemon to crash upon reload. This has been fixed. For reference below is the original advisory text:

Greg MacManus discovered an integer overflow in the smb daemon from Samba, a LanManager like file and printer server for GNU/Linux and Unix-like systems. Requesting a very large number of access control descriptors from the server could exploit the integer overflow, which may result in a buffer overflow which could lead to the execution of arbitrary code with root privileges. Upstream developers have discovered more possible integer overflows that are fixed with this update as well.

For the stable distribution (woody) these problems have been fixed in version 2.2.3a-15.

For the unstable distribution (sid) these problems have been fixed in version 3.0.10-1.

We recommend that you upgrade your samba packages.

Affected Software/OS:
'samba' package(s) on Debian 3.0.

Solution:
Please install the updated package(s).

CVSS Score:
10.0

CVSS Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-1154
http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
BugTraq ID: 11973
http://www.securityfocus.com/bid/11973
CERT/CC vulnerability note: VU#226184
http://www.kb.cert.org/vuls/id/226184
Debian Security Information: DSA-701 (Google Search)
http://www.debian.org/security/2005/dsa-701
http://www.idefense.com/application/poi/display?id=165&type=vulnerabilities
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642
http://www.redhat.com/support/errata/RHSA-2005-020.html
SCO Security Bulletin: SCOSA-2005.17
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
http://secunia.com/advisories/13453/
http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1
SuSE Security Announcement: SUSE-SA:2004:045 (Google Search)
http://www.novell.com/linux/security/advisories/2004_45_samba.html
XForce ISS Database: samba-msrpc-heap-corruption(18519)
https://exchange.xforce.ibmcloud.com/vulnerabilities/18519
CopyrightCopyright (C) 2008 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.