How to Buy
This script is Copyright (C) 2004-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated samba packages that fix various security vulnerabilities are
Samba provides file and printer sharing services to SMB/CIFS clients.
During a code audit, Stefan Esser discovered a buffer overflow in
Samba versions prior to 3.0.8 when handling unicode filenames. An
authenticated remote user could exploit this bug which may lead to
arbitrary code execution on the server. The Common Vulnerabilities and
Exposures project (cve.mitre.org) has assigned the name CVE-2004-0882
to this issue. Red Hat believes that the Exec-Shield technology
(enabled by default since Update 3) will block attempts to remotely
exploit this vulnerability on x86 architectures.
Additionally, a bug was found in the input validation routines in
versions of Samba prior to 3.0.8 that caused the smbd process to
consume abnormal amounts of system memory. An authenticated remote
user could exploit this bug to cause a denial of service. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the
name CVE-2004-0930 to this issue.
Users of Samba should upgrade to these updated packages, which contain
backported security patches, and are not vulnerable to these issues.
See also :
Update the affected packages.
Risk factor :
Critical / CVSS Base Score : 10.0
Family: Red Hat Local Security Checks
Nessus Plugin ID: 15741 ()
CVE ID: CVE-2004-0882CVE-2004-0930
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.