Scientific Linux Security Update : samba and samba3x on SL5.x, SL6.x i386/x86_64

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

A heap-based buffer overflow flaw was found in the DCE-RPC client code
in Samba. A specially crafted DCE-RPC packet could cause various Samba
programs to crash or, possibly, execute arbitrary code when parsed. A
malicious or compromised Active Directory Domain Controller could use
this flaw to compromise the winbindd daemon running with root
privileges. (CVE-2013-4408)

A flaw was found in the way Samba performed ACL checks on alternate
file and directory data streams. An attacker able to access a CIFS
share with alternate stream support enabled could access alternate
data streams regardless of the underlying file or directory ACL
permissions. (CVE-2013-4475)

After installing this update, the smb service will be restarted

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 8.3

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 71341 ()

Bugtraq ID:

CVE ID: CVE-2013-4408