Mandriva Linux Security Advisory : samba (MDVSA-2013:299)

high Nessus Plugin ID 71606

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities has been discovered and corrected in samba :

The winbind_name_list_to_sid_string_list function in nsswitch/pam_winbind.c in Samba through 4.1.2 handles invalid require_membership_of group names by accepting authentication by any user, which allows remote authenticated users to bypass intended access restrictions in opportunistic circumstances by leveraging an administrator's pam_winbind configuration-file mistake (CVE-2012-6150).

Buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet (CVE-2013-4408).

The updated packages has been upgraded to the 3.6.22 version which resolves various upstream bugs and is not vulnerable to these issues.

Solution

Update the affected packages.

See Also

https://www.samba.org/samba/history/samba-3.6.21.html

https://www.samba.org/samba/history/samba-3.6.22.html

Plugin Details

Severity: High

ID: 71606

File Name: mandriva_MDVSA-2013-299.nasl

Version: 1.6

Type: local

Published: 12/23/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 8.3

Temporal Score: 7.2

Vector: CVSS2#AV:A/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64netapi0, p-cpe:/a:mandriva:linux:samba-virusfilter-sophos, p-cpe:/a:mandriva:linux:samba-winbind, p-cpe:/a:mandriva:linux:samba-virusfilter-clamav, p-cpe:/a:mandriva:linux:samba-virusfilter-fsecure, p-cpe:/a:mandriva:linux:samba-swat, p-cpe:/a:mandriva:linux:samba-domainjoin-gui, p-cpe:/a:mandriva:linux:samba-doc, p-cpe:/a:mandriva:linux:nss_wins, cpe:/o:mandriva:business_server:1, p-cpe:/a:mandriva:linux:lib64smbsharemodes0, p-cpe:/a:mandriva:linux:lib64netapi-devel, p-cpe:/a:mandriva:linux:lib64smbclient0-devel, p-cpe:/a:mandriva:linux:lib64wbclient-devel, p-cpe:/a:mandriva:linux:lib64wbclient0, p-cpe:/a:mandriva:linux:samba-server, p-cpe:/a:mandriva:linux:lib64smbclient0-static-devel, p-cpe:/a:mandriva:linux:samba-client, p-cpe:/a:mandriva:linux:samba-common, p-cpe:/a:mandriva:linux:lib64smbsharemodes-devel, p-cpe:/a:mandriva:linux:lib64smbclient0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/22/2013

Reference Information

CVE: CVE-2012-6150, CVE-2013-4408

BID: 64191

MDVSA: 2013:299