Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.900684
Category:Denial of Service
Title:Samba Format String Vulnerability
Summary:Samba is prone to a format string vulnerability.
Description:Summary:
Samba is prone to a format string vulnerability.

Vulnerability Insight:
The flaw is due to: format string error in 'smbclient' utility when
processing file names containing command arguments.

Vulnerability Impact:
Successful exploitation will allow attackers to crash an affected client
or execute arbitrary code.

Affected Software/OS:
Samba 3.2.0 through 3.2.12 on Linux.

Solution:
Upgrade to version 3.2.13 or later.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2009-1886
1022441
http://www.securitytracker.com/id?1022441
35472
http://www.securityfocus.com/bid/35472
35539
http://secunia.com/advisories/35539
35573
http://secunia.com/advisories/35573
35606
http://secunia.com/advisories/35606
36918
http://secunia.com/advisories/36918
ADV-2009-1664
http://www.vupen.com/english/advisories/2009/1664
DSA-1823
http://www.debian.org/security/2009/dsa-1823
MDVSA-2009:196
http://www.mandriva.com/security/advisories?name=MDVSA-2009:196
SSA:2009-177-01
http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.521591
USN-839-1
http://www.ubuntu.com/usn/USN-839-1
http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patch
http://www.samba.org/samba/security/CVE-2009-1886.html
https://bugzilla.samba.org/show_bug.cgi?id=6478
samba-smbclient-format-string(51328)
https://exchange.xforce.ibmcloud.com/vulnerabilities/51328
CopyrightCopyright (C) 2009 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.