Mandrake Linux Security Advisory : samba (MDKSA-2002:081)

critical Nessus Plugin ID 13979

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

A vulnerability in samba versions 2.2.2 through 2.2.6 was discovered by the Debian samba maintainers. A bug in the length checking for encrypted password change requests from clients could be exploited using a buffer overrun attack on the smbd stack. This attack would have to crafted in such a way that converting a DOS codepage string to little endian UCS2 unicode would translate into an executable block of code.

This vulnerability has been fixed in samba version 2.2.7, and the updated packages have had a patch applied to fix the problem.

Solution

Update the affected packages.

See Also

https://www.samba.org/samba/history/samba-2.2.7.html

Plugin Details

Severity: Critical

ID: 13979

File Name: mandrake_MDKSA-2002-081.nasl

Version: 1.18

Type: local

Published: 7/31/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:nss_wins, p-cpe:/a:mandriva:linux:samba, p-cpe:/a:mandriva:linux:samba-client, p-cpe:/a:mandriva:linux:samba-common, p-cpe:/a:mandriva:linux:samba-doc, p-cpe:/a:mandriva:linux:samba-server, p-cpe:/a:mandriva:linux:samba-swat, p-cpe:/a:mandriva:linux:samba-winbind, cpe:/o:mandrakesoft:mandrake_linux:8.1, cpe:/o:mandrakesoft:mandrake_linux:8.2, cpe:/o:mandrakesoft:mandrake_linux:9.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/25/2002

Exploitable With

Metasploit (Samba 2.2.2 - 2.2.6 nttrans Buffer Overflow)

Reference Information

CVE: CVE-2002-1318

MDKSA: 2002:081