Ubuntu 6.06 LTS / 6.10 / 7.04 / 7.10 : samba regression (USN-544-2)

Ubuntu Security Notice (C) 2007-2015 Canonical, Inc. / NASL script (C) 2007-2015 Tenable Network Security, Inc.

Synopsis :

The remote Ubuntu host is missing one or more security-related patches.

Description :

USN-544-1 fixed two vulnerabilities in Samba. Fixes for CVE-2007-5398
are unchanged, but the upstream changes for CVE-2007-4572 introduced a
regression in all releases which caused Linux smbfs mounts to fail.
Additionally, Dapper and Edgy included an incomplete patch which
caused configurations using NetBIOS to fail. A proper fix for these
regressions does not exist at this time, and so the patch addressing
CVE-2007-4572 has been removed. This vulnerability is believed to be
an unexploitable denial of service, but a future update will address
this issue. We apologize for the inconvenience.

Samba developers discovered that nmbd could be made to overrun a
buffer during the processing of GETDC logon server requests. When
samba is configured as a Primary or Backup Domain Controller, a remote
attacker could send malicious logon requests and possibly cause a
denial of service. (CVE-2007-4572)

Alin Rad Pop of Secunia Research discovered that nmbd did
not properly check the length of netbios packets. When samba
is configured as a WINS server, a remote attacker could send
multiple crafted requests resulting in the execution of
arbitrary code with root privileges. (CVE-2007-5398).

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 28288 ()

Bugtraq ID: 26454

CVE ID: CVE-2007-4572