Samba < 3.4.8 / 3.5.2 Session Setup AndX DoS

medium Nessus Plugin ID 46351

Synopsis

The remote service is vulnerable to denial of service attacks.

Description

According to its banner, the version of Samba installed on the remote host is a version of 3.4 before 3.4.8 or 3.5 < 3.5.2. Such versions are affected by two denial of service vulnerabilities that can be triggered via either a NULL pointer dereference or an uninitialized variable read.

By sending specially crafted 'Session Setup AndX' requests, an unauthenticated, remote attacker can exploit these vulnerabilities to crash the affected service, thereby denying service to legitimate users.

Solution

Upgrade to Samba 3.4.8 / 3.5.2 or later.

See Also

https://www.samba.org/samba/history/samba-3.5.2.html

http://www.nessus.org/u?66795feb

https://bugzilla.samba.org/show_bug.cgi?id=7229

https://bugzilla.samba.org/show_bug.cgi?id=7254

https://www.samba.org/samba/history/samba-3.4.8.html

Plugin Details

Severity: Medium

ID: 46351

File Name: samba_3_5_2.nasl

Version: 1.15

Type: remote

Family: Misc.

Published: 5/17/2010

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/a:samba:samba

Required KB Items: SMB/NativeLanManager, SMB/samba, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 5/11/2010

Vulnerability Publication Date: 5/12/2010

Reference Information

CVE: CVE-2010-1635, CVE-2010-1642

BID: 40097