Description: | Summary: The remote host is missing an update for the Debian 'samba' package(s) announced via the DSA-1409-3 advisory.
Vulnerability Insight: This update fixes all currently known regressions introduced with the previous two revisions of DSA-1409. The original text is reproduced below:
Several local/remote vulnerabilities have been discovered in samba, a LanManager-like file and printer server for Unix. The Common Vulnerabilities and Exposures project identifies the following problems:
CVE-2007-5398
Alin Rad Pop of Secunia Research discovered that nmbd did not properly check the length of netbios packets. When samba is configured as a WINS server, a remote attacker could send multiple crafted requests resulting in the execution of arbitrary code with root privileges.
CVE-2007-4572
Samba developers discovered that nmbd could be made to overrun a buffer during the processing of GETDC logon server requests. When samba is configured as a Primary or Backup Domain Controller, a remote attacker could send malicious logon requests and possibly cause a denial of service.
For the old stable distribution (sarge), these problems have been fixed in version 3.0.14a-3sarge10.
For the stable distribution (etch), these problems have been fixed in version 3.0.24-6etch8.
For the unstable distribution (sid), these problems have been fixed in version 3.0.27-1.
We recommend that you upgrade your samba packages.
Affected Software/OS: 'samba' package(s) on Debian 3.1, Debian 4.
Solution: Please install the updated package(s).
CVSS Score: 9.3
CVSS Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
|