Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.840348
Category:Ubuntu Local Security Checks
Title:Ubuntu: Security Advisory (USN-617-1)
Summary:The remote host is missing an update for the 'samba' package(s) announced via the USN-617-1 advisory.
Description:Summary:
The remote host is missing an update for the 'samba' package(s) announced via the USN-617-1 advisory.

Vulnerability Insight:
Samba developers discovered that nmbd could be made to overrun
a buffer during the processing of GETDC logon server requests.
When samba is configured as a Primary or Backup Domain Controller,
a remote attacker could send malicious logon requests and possibly
cause a denial of service. (CVE-2007-4572)

Alin Rad Pop of Secunia Research discovered that Samba did not
properly perform bounds checking when parsing SMB replies. A remote
attacker could send crafted SMB packets and execute arbitrary code.
(CVE-2008-1105)

Affected Software/OS:
'samba' package(s) on Ubuntu 6.06, Ubuntu 7.04, Ubuntu 7.10, Ubuntu 8.04.

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-4572
1018954
http://securitytracker.com/id?1018954
20080108 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages
http://www.securityfocus.com/archive/1/485936/100/0/threaded
20080123 UPDATED VMSA-2008-0001.1 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages
http://www.securityfocus.com/archive/1/486859/100/0/threaded
237764
http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1
26454
http://www.securityfocus.com/bid/26454
27450
http://secunia.com/advisories/27450
27679
http://secunia.com/advisories/27679
27682
http://secunia.com/advisories/27682
27691
http://secunia.com/advisories/27691
27701
http://secunia.com/advisories/27701
27720
http://secunia.com/advisories/27720
27731
http://secunia.com/advisories/27731
27787
http://secunia.com/advisories/27787
27927
http://secunia.com/advisories/27927
28136
http://secunia.com/advisories/28136
28368
http://secunia.com/advisories/28368
29341
http://secunia.com/advisories/29341
30484
http://secunia.com/advisories/30484
30736
http://secunia.com/advisories/30736
30835
http://secunia.com/advisories/30835
ADV-2007-3869
http://www.vupen.com/english/advisories/2007/3869
ADV-2007-4238
http://www.vupen.com/english/advisories/2007/4238
ADV-2008-0064
http://www.vupen.com/english/advisories/2008/0064
ADV-2008-0859
http://www.vupen.com/english/advisories/2008/0859/references
ADV-2008-1712
http://www.vupen.com/english/advisories/2008/1712/references
ADV-2008-1908
http://www.vupen.com/english/advisories/2008/1908
APPLE-SA-2007-12-17
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
DSA-1409
http://www.debian.org/security/2007/dsa-1409
FEDORA-2007-3402
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html
GLSA-200711-29
http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml
HPSBUX02316
http://marc.info/?l=bugtraq&m=120524782005154&w=2
HPSBUX02341
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
MDKSA-2007:224
http://www.mandriva.com/security/advisories?name=MDKSA-2007:224
RHSA-2007:1013
http://www.redhat.com/support/errata/RHSA-2007-1013.html
RHSA-2007:1016
http://www.redhat.com/support/errata/RHSA-2007-1016.html
RHSA-2007:1017
http://www.redhat.com/support/errata/RHSA-2007-1017.html
SSA:2007-320-01
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.447739
SSRT071495
SSRT080075
SUSE-SA:2007:065
http://www.novell.com/linux/security/advisories/2007_65_samba.html
TA07-352A
http://www.us-cert.gov/cas/techalerts/TA07-352A.html
USN-544-1
https://usn.ubuntu.com/544-1/
USN-544-2
http://www.ubuntu.com/usn/usn-544-2
USN-617-1
http://www.ubuntu.com/usn/usn-617-1
[Security-announce] 20080107 VMSA-2008-0001 Moderate OpenPegasus PAM Authentication Buffer Overflow and updated service console packages
http://lists.vmware.com/pipermail/security-announce/2008/000002.html
http://docs.info.apple.com/article.html?artnum=307179
http://us1.samba.org/samba/security/CVE-2007-4572.html
http://www.vmware.com/security/advisories/VMSA-2008-0001.html
https://issues.rpath.com/browse/RPL-1894
oval:org.mitre.oval:def:11132
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11132
oval:org.mitre.oval:def:5643
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5643
samba-nmbd-bo(38501)
https://exchange.xforce.ibmcloud.com/vulnerabilities/38501
Common Vulnerability Exposure (CVE) ID: CVE-2008-1105
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
BugTraq ID: 29404
http://www.securityfocus.com/bid/29404
BugTraq ID: 31255
http://www.securityfocus.com/bid/31255
Bugtraq: 20080528 [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses (Google Search)
http://www.securityfocus.com/archive/1/492683/100/0/threaded
Bugtraq: 20080529 Secunia Research: Samba "receive_smb_raw()" Buffer OverflowVulnerability (Google Search)
http://www.securityfocus.com/archive/1/492737/100/0/threaded
Bugtraq: 20080602 rPSA-2008-0180-1 samba samba-client samba-server samba-swat (Google Search)
http://www.securityfocus.com/archive/1/492903/100/0/threaded
Debian Security Information: DSA-1590 (Google Search)
http://www.debian.org/security/2008/dsa-1590
https://www.exploit-db.com/exploits/5712
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01006.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01030.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg01082.html
http://security.gentoo.org/glsa/glsa-200805-23.xml
HPdes Security Advisory: HPSBUX02341
HPdes Security Advisory: SSRT080075
http://www.mandriva.com/security/advisories?name=MDVSA-2008:108
http://secunia.com/secunia_research/2008-20/advisory/
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10020
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5733
http://www.redhat.com/support/errata/RHSA-2008-0288.html
http://www.redhat.com/support/errata/RHSA-2008-0289.html
http://www.redhat.com/support/errata/RHSA-2008-0290.html
http://securitytracker.com/id?1020123
http://secunia.com/advisories/30228
http://secunia.com/advisories/30385
http://secunia.com/advisories/30396
http://secunia.com/advisories/30442
http://secunia.com/advisories/30449
http://secunia.com/advisories/30478
http://secunia.com/advisories/30489
http://secunia.com/advisories/30543
http://secunia.com/advisories/30802
http://secunia.com/advisories/31246
http://secunia.com/advisories/31911
http://secunia.com/advisories/33696
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.473951
http://sunsolve.sun.com/search/document.do?assetkey=1-26-249086-1
SuSE Security Announcement: SUSE-SA:2008:026 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00000.html
http://www.ubuntu.com/usn/usn-617-2
http://www.vupen.com/english/advisories/2008/1681
http://www.vupen.com/english/advisories/2008/1981/references
http://www.vupen.com/english/advisories/2008/2222/references
http://www.vupen.com/english/advisories/2008/2639
XForce ISS Database: samba-receivesmbraw-bo(42664)
https://exchange.xforce.ibmcloud.com/vulnerabilities/42664
XForce ISS Database: xerox-controller-samba-code-execution(45251)
https://exchange.xforce.ibmcloud.com/vulnerabilities/45251
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.