Samba < 3.0.24 Multiple Flaws

high Nessus Plugin ID 24685

Synopsis

The remote Samba server is affected by several vulnerabilities that could lead to remote code execution

Description

According to its version number, the remote Samba server is affected by several flaws :

- A denial of service issue occuring if an authenticated attacker sends a large number of CIFS session requests which will cause an infinite loop to occur in the smbd daemon, thus utilizing CPU resources and denying access to legitimate users ;

- A remote format string vulnerability that could be exploited by an attacker with write access to a remote share by sending a malformed request to the remote service (this issue only affects installations sharing an AFS file system when the afsacl.so VFS module is loaded)

- A remote buffer overflow vulnerability affecting the NSS lookup capability of the remote winbindd daemon

Solution

Upgrade to Samba 3.0.24 or newer

Plugin Details

Severity: High

ID: 24685

File Name: samba_3_0_24.nasl

Version: 1.17

Type: remote

Family: Misc.

Published: 2/22/2007

Updated: 7/27/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.8

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:samba:samba

Required KB Items: Settings/ParanoidReport, SMB/NativeLanManager

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2/5/2007

Reference Information

CVE: CVE-2007-0452, CVE-2007-0453, CVE-2007-0454

BID: 22395, 22403, 22410