FreeBSD : samba -- denial of service vulnerability (e21c7c7a-0116-11e3-9e83-3c970e169bc2)

medium Nessus Plugin ID 69293

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

The Samba project reports :

All current released versions of Samba are vulnerable to a denial of service on an authenticated or guest connection. A malformed packet can cause the smbd server to loop the CPU performing memory allocations and preventing any further service.

A connection to a file share, or a local account is needed to exploit this problem, either authenticated or unauthenticated if guest connections are allowed.

Solution

Update the affected packages.

See Also

https://www.samba.org/samba/security/CVE-2013-4124

http://www.nessus.org/u?b63de206

Plugin Details

Severity: Medium

ID: 69293

File Name: freebsd_pkg_e21c7c7a011611e39e833c970e169bc2.nasl

Version: 1.17

Type: local

Published: 8/10/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:samba34, p-cpe:/a:freebsd:freebsd:samba35, p-cpe:/a:freebsd:freebsd:samba36, p-cpe:/a:freebsd:freebsd:samba4, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 8/9/2013

Vulnerability Publication Date: 8/5/2013

Reference Information

CVE: CVE-2013-4124