![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.66243 |
Category: | Red Hat Local Security Checks |
Title: | RedHat Security Advisory RHSA-2009:1585 |
Summary: | The remote host is missing updates announced in;advisory RHSA-2009:1585.;;Samba is a suite of programs used by machines to share files, printers, and;other information. These samba3x packages provide Samba 3.3, which is a;Technology Preview for Red Hat Enterprise Linux 5. These packages cannot be;installed in parallel with the samba packages. Note: Technology Previews;are not intended for production use.;;A denial of service flaw was found in the Samba smbd daemon. An;authenticated, remote user could send a specially-crafted response that;would cause an smbd child process to enter an infinite loop. An;authenticated, remote user could use this flaw to exhaust system resources;by opening multiple CIFS sessions. (CVE-2009-2906);;An uninitialized data access flaw was discovered in the smbd daemon when;using the non-default dos filemode configuration option in smb.conf. An;authenticated, remote user with write access to a file could possibly use;this flaw to change an access control list for that file, even when such;access should have been denied. (CVE-2009-1888);;A flaw was discovered in the way Samba handled users without a home;directory set in the back-end password database (e.g. /etc/passwd). If a;share for the home directory of such a user was created (e.g. using the;automated [homes] share), any user able to access that share could see;the whole file system, possibly bypassing intended access restrictions.;(CVE-2009-2813);;The mount.cifs program printed CIFS passwords as part of its debug output;when running in verbose mode. When mount.cifs had the setuid bit set, a;local, unprivileged user could use this flaw to disclose passwords from a;file that would otherwise be inaccessible to that user. Note: mount.cifs;from the samba3x packages distributed by Red Hat does not have the setuid;bit set. This flaw only affected systems where the setuid bit was manually;set by an administrator. (CVE-2009-2948);;These packages upgrade Samba from version 3.3.5 to version 3.3.8. Refer to;the Samba Release Notes for a list of changes between versions:;;Users of samba3x should upgrade to these updated packages, which resolve;these issues. After installing this update, the smb service will be;restarted automatically. |
Description: | Summary: The remote host is missing updates announced in advisory RHSA-2009:1585. Samba is a suite of programs used by machines to share files, printers, and other information. These samba3x packages provide Samba 3.3, which is a Technology Preview for Red Hat Enterprise Linux 5. These packages cannot be installed in parallel with the samba packages. Note: Technology Previews are not intended for production use. A denial of service flaw was found in the Samba smbd daemon. An authenticated, remote user could send a specially-crafted response that would cause an smbd child process to enter an infinite loop. An authenticated, remote user could use this flaw to exhaust system resources by opening multiple CIFS sessions. (CVE-2009-2906) An uninitialized data access flaw was discovered in the smbd daemon when using the non-default dos filemode configuration option in smb.conf. An authenticated, remote user with write access to a file could possibly use this flaw to change an access control list for that file, even when such access should have been denied. (CVE-2009-1888) A flaw was discovered in the way Samba handled users without a home directory set in the back-end password database (e.g. /etc/passwd). If a share for the home directory of such a user was created (e.g. using the automated [homes] share), any user able to access that share could see the whole file system, possibly bypassing intended access restrictions. (CVE-2009-2813) The mount.cifs program printed CIFS passwords as part of its debug output when running in verbose mode. When mount.cifs had the setuid bit set, a local, unprivileged user could use this flaw to disclose passwords from a file that would otherwise be inaccessible to that user. Note: mount.cifs from the samba3x packages distributed by Red Hat does not have the setuid bit set. This flaw only affected systems where the setuid bit was manually set by an administrator. (CVE-2009-2948) These packages upgrade Samba from version 3.3.5 to version 3.3.8. Refer to the Samba Release Notes for a list of changes between versions: Users of samba3x should upgrade to these updated packages, which resolve these issues. After installing this update, the smb service will be restarted automatically. Solution: Please note that this update is available via Red Hat Network. To use Red Hat Network, launch the Red Hat Update Agent with the following command: up2date CVSS Score: 6.0 CVSS Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-1888 1022442 http://www.securitytracker.com/id?1022442 20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat http://www.securityfocus.com/archive/1/507856/100/0/threaded 35472 http://www.securityfocus.com/bid/35472 35539 http://secunia.com/advisories/35539 35573 http://secunia.com/advisories/35573 35606 http://secunia.com/advisories/35606 36918 http://secunia.com/advisories/36918 ADV-2009-1664 http://www.vupen.com/english/advisories/2009/1664 DSA-1823 http://www.debian.org/security/2009/dsa-1823 MDVSA-2009:196 http://www.mandriva.com/security/advisories?name=MDVSA-2009:196 SSA:2009-177-01 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.521591 USN-839-1 http://www.ubuntu.com/usn/USN-839-1 http://wiki.rpath.com/Advisories:rPSA-2009-0145 http://www.samba.org/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch http://www.samba.org/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch http://www.samba.org/samba/security/CVE-2009-1888.html oval:org.mitre.oval:def:10790 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10790 oval:org.mitre.oval:def:7292 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7292 samba-acl-security-bypass(51327) https://exchange.xforce.ibmcloud.com/vulnerabilities/51327 Common Vulnerability Exposure (CVE) ID: CVE-2009-2813 http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html BugTraq ID: 36363 http://www.securityfocus.com/bid/36363 Bugtraq: 20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat (Google Search) https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html HPdes Security Advisory: HPSBUX02479 http://marc.info/?l=bugtraq&m=126514298313071&w=2 HPdes Security Advisory: SSRT090212 http://osvdb.org/57955 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191 http://secunia.com/advisories/36701 http://secunia.com/advisories/36893 http://secunia.com/advisories/36937 http://secunia.com/advisories/36953 http://secunia.com/advisories/37428 http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1 SuSE Security Announcement: SUSE-SR:2009:017 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html http://www.vupen.com/english/advisories/2009/2810 XForce ISS Database: macosx-smb-security-bypass(53174) https://exchange.xforce.ibmcloud.com/vulnerabilities/53174 Common Vulnerability Exposure (CVE) ID: CVE-2009-2906 1021111 1022976 http://www.securitytracker.com/id?1022976 36573 http://www.securityfocus.com/bid/36573 36893 36937 36953 37428 58519 http://osvdb.org/58519 ADV-2009-2810 APPLE-SA-2010-03-29-1 http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html FEDORA-2009-10172 FEDORA-2009-10180 SSA:2009-276-01 SUSE-SR:2009:017 http://news.samba.org/releases/3.0.37/ http://news.samba.org/releases/3.2.15/ http://news.samba.org/releases/3.3.8/ http://news.samba.org/releases/3.4.2/ http://samba.org/samba/security/CVE-2009-2906.html http://support.apple.com/kb/HT4077 oval:org.mitre.oval:def:7090 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7090 oval:org.mitre.oval:def:9944 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944 samba-smb-dos(53575) https://exchange.xforce.ibmcloud.com/vulnerabilities/53575 Common Vulnerability Exposure (CVE) ID: CVE-2009-2948 BugTraq ID: 36572 http://www.securityfocus.com/bid/36572 http://osvdb.org/58520 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10434 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7087 http://www.securitytracker.com/id?1022975 XForce ISS Database: samba-mountcifs-info-disclosure(53574) https://exchange.xforce.ibmcloud.com/vulnerabilities/53574 |
Copyright | Copyright (C) 2009 E-Soft Inc. |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |