This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote Samba server is affected by multiple vulnerabilities.
According to its banner, the version of Samba running on the remote
host is 3.4.x or later but prior to 3.6.23 or 4.0.x or later but prior
to 4.0.16 or 4.1.6. It is, therefore, potentially affected by multiple
- A flaw exists in the Security Account Manager Remote
protocol implementation where it fails to validate the
user lockout state, affecting Samba versions 3.4.x and
later. This could allow a remote attacker to attempt a
brute-force attack to determine a user's password
without being locked out. (CVE-2013-4496)
- A flaw exists in the 'owner_set' function of the
smbcacls command when changing the owner or group owner
of the object using '-C' / '--chown' or '-G' / '--chgrp'
flags, causing the existing ACL to be removed. This
affects Samba versions 4.0.x and later and could allow
an attacker unrestricted access to the modified object.
Note that Nessus has relied only on the self-reported version number and
has not actually tried to exploit these issues or determine if the
associated patches have been applied.
See also :
Upgrade to version 3.6.23 / 4.0.16 / 4.1.6 or later or refer to the
vendor for patches or workarounds.
Risk factor :
Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 5.0
Public Exploit Available : true