Description: | Description:
The remote host is missing an update to samba announced via advisory FEDORA-2008-4679.
Update Information:
Fix CVE-2008-1105 A heap-based buffer overflow flaw has been found in the way Samba clients handle over-sized packets. If a client connected to a malicious Samba server, it was possible to execute arbitrary code as the Samba client user. The Samba server can also act as a client to perform some operations (print notify, domain member vs domain controler ...). This could result in the server executing the vulnerable client code, resulting in arbitrary code execution with the permissions of the Samba server. ChangeLog:
* Wed May 28 2008 Simo Sorce 3.0.30-0.fc8 - New upstream security release to fix CVE-2008-1105 * Wed May 21 2008 Simo Sorce 3.0.29-1.fc8 - Fix packaging issue * Wed May 21 2008 Simo Sorce 3.0.29-0.fc8 - New upstream bugfix release
References:
[ 1 ] Bug #446724 - CVE-2008-1105 Samba client buffer overflow https://bugzilla.redhat.com/show_bug.cgi?id=446724
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update samba' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2008-4679
Risk factor : Critical
CVSS Score: 9.3
|