Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.66119
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2009:1529
Summary:The remote host is missing updates announced in;advisory RHSA-2009:1529.;;Samba is a suite of programs used by machines to share files, printers, and;other information.;;A denial of service flaw was found in the Samba smbd daemon. An;authenticated, remote user could send a specially-crafted response that;would cause an smbd child process to enter an infinite loop. An;authenticated, remote user could use this flaw to exhaust system resources;by opening multiple CIFS sessions. (CVE-2009-2906);;An uninitialized data access flaw was discovered in the smbd daemon when;using the non-default dos filemode configuration option in smb.conf. An;authenticated, remote user with write access to a file could possibly use;this flaw to change an access control list for that file, even when such;access should have been denied. (CVE-2009-1888);;A flaw was discovered in the way Samba handled users without a home;directory set in the back-end password database (e.g. /etc/passwd). If a;share for the home directory of such a user was created (e.g. using the;automated [homes] share), any user able to access that share could see;the whole file system, possibly bypassing intended access restrictions.;(CVE-2009-2813);;The mount.cifs program printed CIFS passwords as part of its debug output;when running in verbose mode. When mount.cifs had the setuid bit set, a;local, unprivileged user could use this flaw to disclose passwords from a;file that would otherwise be inaccessible to that user. Note: mount.cifs;from the samba packages distributed by Red Hat does not have the setuid bit;set. This flaw only affected systems where the setuid bit was manually set;by an administrator. (CVE-2009-2948);;Users of Samba should upgrade to these updated packages, which contain;backported patches to correct these issues. After installing this update,;the smb service will be restarted automatically.
Description:Summary:
The remote host is missing updates announced in
advisory RHSA-2009:1529.

Samba is a suite of programs used by machines to share files, printers, and
other information.

A denial of service flaw was found in the Samba smbd daemon. An
authenticated, remote user could send a specially-crafted response that
would cause an smbd child process to enter an infinite loop. An
authenticated, remote user could use this flaw to exhaust system resources
by opening multiple CIFS sessions. (CVE-2009-2906)

An uninitialized data access flaw was discovered in the smbd daemon when
using the non-default dos filemode configuration option in smb.conf. An
authenticated, remote user with write access to a file could possibly use
this flaw to change an access control list for that file, even when such
access should have been denied. (CVE-2009-1888)

A flaw was discovered in the way Samba handled users without a home
directory set in the back-end password database (e.g. /etc/passwd). If a
share for the home directory of such a user was created (e.g. using the
automated [homes] share), any user able to access that share could see
the whole file system, possibly bypassing intended access restrictions.
(CVE-2009-2813)

The mount.cifs program printed CIFS passwords as part of its debug output
when running in verbose mode. When mount.cifs had the setuid bit set, a
local, unprivileged user could use this flaw to disclose passwords from a
file that would otherwise be inaccessible to that user. Note: mount.cifs
from the samba packages distributed by Red Hat does not have the setuid bit
set. This flaw only affected systems where the setuid bit was manually set
by an administrator. (CVE-2009-2948)

Users of Samba should upgrade to these updated packages, which contain
backported patches to correct these issues. After installing this update,
the smb service will be restarted automatically.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

CVSS Score:
6.0

CVSS Vector:
AV:N/AC:M/Au:S/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-1888
1022442
http://www.securitytracker.com/id?1022442
20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat
http://www.securityfocus.com/archive/1/507856/100/0/threaded
35472
http://www.securityfocus.com/bid/35472
35539
http://secunia.com/advisories/35539
35573
http://secunia.com/advisories/35573
35606
http://secunia.com/advisories/35606
36918
http://secunia.com/advisories/36918
ADV-2009-1664
http://www.vupen.com/english/advisories/2009/1664
DSA-1823
http://www.debian.org/security/2009/dsa-1823
MDVSA-2009:196
http://www.mandriva.com/security/advisories?name=MDVSA-2009:196
SSA:2009-177-01
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.521591
USN-839-1
http://www.ubuntu.com/usn/USN-839-1
http://wiki.rpath.com/Advisories:rPSA-2009-0145
http://www.samba.org/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch
http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch
http://www.samba.org/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch
http://www.samba.org/samba/security/CVE-2009-1888.html
oval:org.mitre.oval:def:10790
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10790
oval:org.mitre.oval:def:7292
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7292
samba-acl-security-bypass(51327)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51327
Common Vulnerability Exposure (CVE) ID: CVE-2009-2813
http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
BugTraq ID: 36363
http://www.securityfocus.com/bid/36363
Bugtraq: 20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat (Google Search)
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html
https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html
HPdes Security Advisory: HPSBUX02479
http://marc.info/?l=bugtraq&m=126514298313071&w=2
HPdes Security Advisory: SSRT090212
http://osvdb.org/57955
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191
http://secunia.com/advisories/36701
http://secunia.com/advisories/36893
http://secunia.com/advisories/36937
http://secunia.com/advisories/36953
http://secunia.com/advisories/37428
http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1
SuSE Security Announcement: SUSE-SR:2009:017 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
http://www.vupen.com/english/advisories/2009/2810
XForce ISS Database: macosx-smb-security-bypass(53174)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53174
Common Vulnerability Exposure (CVE) ID: CVE-2009-2906
1021111
1022976
http://www.securitytracker.com/id?1022976
36573
http://www.securityfocus.com/bid/36573
36893
36937
36953
37428
58519
http://osvdb.org/58519
ADV-2009-2810
APPLE-SA-2010-03-29-1
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html
FEDORA-2009-10172
FEDORA-2009-10180
SSA:2009-276-01
SUSE-SR:2009:017
http://news.samba.org/releases/3.0.37/
http://news.samba.org/releases/3.2.15/
http://news.samba.org/releases/3.3.8/
http://news.samba.org/releases/3.4.2/
http://samba.org/samba/security/CVE-2009-2906.html
http://support.apple.com/kb/HT4077
oval:org.mitre.oval:def:7090
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7090
oval:org.mitre.oval:def:9944
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944
samba-smb-dos(53575)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53575
Common Vulnerability Exposure (CVE) ID: CVE-2009-2948
BugTraq ID: 36572
http://www.securityfocus.com/bid/36572
http://osvdb.org/58520
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10434
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7087
http://www.securitytracker.com/id?1022975
XForce ISS Database: samba-mountcifs-info-disclosure(53574)
https://exchange.xforce.ibmcloud.com/vulnerabilities/53574
CopyrightCopyright (C) 2009 E-Soft Inc.

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.