Description: | Summary: The remote host is missing an update for the 'samba' package(s) announced via the SSA:2007-038-01 advisory.
Vulnerability Insight: New samba packages are available for Slackware 10.0, 10.1, 10.2, and 11.0 to fix a denial-of-service security issue.
More details about the issues fixed in Samba 3.0.24 may be found in the Common Vulnerabilities and Exposures (CVE) database:
[links moved to references]
Here are the details from the Slackware 11.0 ChangeLog: +--------------------------+ patches/packages/samba-3.0.24-i486-1_slack11.0.tgz: Upgraded to samba-3.0.24. From the WHATSNEW.txt file: 'Important issues addressed in 3.0.24 include: o Fixes for the following security advisories: - CVE-2007-0452 (Potential Denial of Service bug in smbd) - CVE-2007-0453 (Buffer overrun in NSS host lookup Winbind NSS library on Solaris) - CVE-2007-0454 (Format string bug in afsacl.so VFS plugin)' Samba is Slackware is vulnerable to the first issue, which can cause smbd to enter into an infinite loop, disrupting Samba services. Linux is not vulnerable to the second issue, and Slackware does not ship the afsacl.so VFS plugin (but it's something to be aware of if you build Samba with custom options). For more information, see: [links moved to references] (* Security fix *) +--------------------------+
Affected Software/OS: 'samba' package(s) on Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware 11.0.
Solution: Please install the updated package(s).
CVSS Score: 7.5
CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
|