This script is Copyright (C) 2004-2017 Tenable Network Security, Inc.
The remote host is missing a vendor-supplied security patch.
The remote host is missing a security patch for samba. It is,
therefore, affected by a buffer overflow condition in the
call_trans2open() function within file trans2.c due to improper
sanitization of user-supplied input. An unauthenticated, remote
attacker can exploit this, via an overly long string passed to the
pname variable, to execute arbitrary code with the privileges of the
See also :
Update the affected samba and samba-client packages according to the
SUSE-SA:2003:025 security announcement.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.3
Public Exploit Available : true