Scientific Linux Security Update : samba4 on SL6.x i386/x86_64 (20150223)

critical Nessus Plugin ID 81476

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

An uninitialized pointer use flaw was found in the Samba daemon (smbd). A malicious Samba client could send specially crafted netlogon packets that, when processed by smbd, could potentially lead to arbitrary code execution with the privileges of the user running smbd (by default, the root user). (CVE-2015-0240)

After installing this update, the smb service will be restarted automatically.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?23c31808

Plugin Details

Severity: Critical

ID: 81476

File Name: sl_20150223_samba4_on_SL6_x.nasl

Version: 1.10

Type: local

Agent: unix

Published: 2/24/2015

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.2

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:samba4, p-cpe:/a:fermilab:scientific_linux:samba4-client, p-cpe:/a:fermilab:scientific_linux:samba4-common, p-cpe:/a:fermilab:scientific_linux:samba4-dc, p-cpe:/a:fermilab:scientific_linux:samba4-dc-libs, p-cpe:/a:fermilab:scientific_linux:samba4-debuginfo, p-cpe:/a:fermilab:scientific_linux:samba4-devel, p-cpe:/a:fermilab:scientific_linux:samba4-libs, p-cpe:/a:fermilab:scientific_linux:samba4-pidl, p-cpe:/a:fermilab:scientific_linux:samba4-python, p-cpe:/a:fermilab:scientific_linux:samba4-swat, p-cpe:/a:fermilab:scientific_linux:samba4-test, p-cpe:/a:fermilab:scientific_linux:samba4-winbind, p-cpe:/a:fermilab:scientific_linux:samba4-winbind-clients, p-cpe:/a:fermilab:scientific_linux:samba4-winbind-krb5-locator, x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/23/2015

Vulnerability Publication Date: 2/24/2015

Reference Information

CVE: CVE-2015-0240