This script is Copyright (C) 2014-2016 Tenable Network Security, Inc.
The remote Samba server is affected by multiple vulnerabilities.
According to its banner, the version of Samba running on the remote
host is 3.4.x or later but prior to 3.6.23 or 4.0.x or later but prior
to 4.0.16 or 4.1.6. It is, therefore, potentially affected by multiple
- A flaw exists in the Security Account Manager Remote
protocol implementation where it fails to validate the
user lockout state, affecting Samba versions 3.4.x and
later. This could allow a remote attacker to attempt a
brute-force attack to determine a user's password
without being locked out. (CVE-2013-4496)
- A flaw exists in the 'owner_set' function of the
smbcacls command when changing the owner or group owner
of the object using '-C' / '--chown' or '-G' / '--chgrp'
flags, causing the existing ACL to be removed. This
affects Samba versions 4.0.x and later and could allow
an attacker unrestricted access to the modified object.
Note that Nessus has relied only on the self-reported version number and
has not actually tried to exploit these issues or determine if the
associated patches have been applied.
See also :
Upgrade to version 3.6.23 / 4.0.16 / 4.1.6 or later or refer to the
vendor for patches or workarounds.
Risk factor :
Medium / CVSS Base Score : 5.8
CVSS Temporal Score : 4.8
Public Exploit Available : true
Nessus Plugin ID: 73080 ()
Bugtraq ID: 6623266336
CVE ID: CVE-2013-4496CVE-2013-6442
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.