Scientific Linux Security Update : samba on SL5.x i386/x86_64

high Nessus Plugin ID 60413

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

A heap-based buffer overflow flaw was found in the way Samba clients handle over-sized packets. If a client connected to a malicious Samba server, it was possible to execute arbitrary code as the Samba client user. It was also possible for a remote user to send a specially crafted print request to a Samba server that could result in the server executing the vulnerable client code, resulting in arbitrary code execution with the permissions of the Samba server.
(CVE-2008-1105)

This update also addresses two issues which prevented Samba from joining certain Windows domains with tightened security policies, and prevented certain signed SMB content from working as expected :

- when some Windows® 2000-based domain controllers were set to use mandatory signing, Samba clients would drop the connection because of an error when generating signatures. This presented as a 'Server packet had invalid SMB signature' error to the Samba client. This update corrects the signature generation error.

- Samba servers using the 'net ads join' command to connect to a Windows Server® 2003-based domain would fail with 'failed to get schannel session key from server' and 'NT_STATUS_ACCESS_DENIED' errors. This update correctly binds to the NETLOGON share, allowing Samba servers to connect to the domain properly.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?d0f7c2b6

Plugin Details

Severity: High

ID: 60413

File Name: sl_20080528_samba_on_SL5_x.nasl

Version: 1.5

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 5/28/2008

Reference Information

CVE: CVE-2008-1105

CWE: 119