RHEL 2.1 / 3 / 4 / 5 : samba (RHSA-2007:1114)

high Nessus Plugin ID 29303

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

Updated samba packages that fix a security issue and a bug are now available for Red Hat Enterprise Linux.

This update has been rated as having critical security impact by the Red Hat Security Response Team.

Samba is a suite of programs used by machines to share files, printers, and other information.

A stack-based buffer overflow flaw was found in the way Samba authenticates remote users. A remote unauthenticated user could trigger this flaw to cause the Samba server to crash, or execute arbitrary code with the permissions of the Samba server.
(CVE-2007-6015)

Red Hat would like to thank Alin Rad Pop of Secunia Research for responsibly disclosing this issue.

This update also fixes a regression caused by the fix for CVE-2007-4572, which prevented some clients from being able to properly access shares.

Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve these issues.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/cve/cve-2007-6015

https://access.redhat.com/errata/RHSA-2007:1114

Plugin Details

Severity: High

ID: 29303

File Name: redhat-RHSA-2007-1114.nasl

Version: 1.28

Type: local

Agent: unix

Published: 12/11/2007

Updated: 1/14/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:samba-swat, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:samba-common, p-cpe:/a:redhat:enterprise_linux:samba-client, cpe:/o:redhat:enterprise_linux:3, p-cpe:/a:redhat:enterprise_linux:samba, cpe:/o:redhat:enterprise_linux:4, cpe:/o:redhat:enterprise_linux:5.1, cpe:/o:redhat:enterprise_linux:4.6, cpe:/o:redhat:enterprise_linux:2.1

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/10/2007

Vulnerability Publication Date: 11/16/2007

Reference Information

CVE: CVE-2007-4572, CVE-2007-6015

BID: 26791, 27163

CWE: 119

RHSA: 2007:1114