SUSE-SA:2003:025: samba

critical Nessus Plugin ID 13795

Synopsis

The remote host is missing a vendor-supplied security patch.

Description

The remote host is missing a security patch for samba. It is, therefore, affected by a buffer overflow condition in the call_trans2open() function within file trans2.c due to improper sanitization of user-supplied input. An unauthenticated, remote attacker can exploit this, via an overly long string passed to the pname variable, to execute arbitrary code with the privileges of the server.

Solution

Update the affected samba and samba-client packages according to the SUSE-SA:2003:025 security announcement.

See Also

https://www.suse.com/support/security/advisories/2003_025_samba.html

Plugin Details

Severity: Critical

ID: 13795

File Name: suse_SA_2003_025.nasl

Version: 1.20

Type: local

Agent: unix

Published: 7/25/2004

Updated: 1/14/2021

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:samba:samba

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/7/2003

Vulnerability Publication Date: 4/7/2003

Exploitable With

CANVAS (CANVAS)

Metasploit (Samba trans2open Overflow (Solaris SPARC))

Reference Information

CVE: CVE-2003-0201

BID: 7294

CERT: 267873