Mandrake Linux Security Advisory : samba (MDKSA-2007:224-3)

This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.


Synopsis :

The remote Mandrake Linux host is missing one or more security
updates.

Description :

The samba developers discovered that nmbd could be made to overrun a
buffer during the processing of GETDC logon server requests. If samba
is configured as a Primary or Backup Domain Controller, this could be
used by a remote attacker to send malicious logon requests and
possibly cause a denial of service (CVE-2007-4572).

As well, Alin Rad Pop of Secunia Research found that nmbd did not
properly check the length of netbios packets. If samba is configured
as a WINS server, this could be used by a remote attacker able to send
multiple crafted requests to nmbd, resulting in the execution of
arbitrary code with root privileges (CVE-2007-5398).

Update :

This update corrects all known regressions with previous Samba updates
due to the security fixes to correct CVE-2007-4572.

See also :

https://bugzilla.samba.org/show_bug.cgi?id=5087

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Mandriva Local Security Checks

Nessus Plugin ID: 28274 (mandrake_MDKSA-2007-224.nasl)

Bugtraq ID: 26454
26455

CVE ID: CVE-2007-4572
CVE-2007-5398

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now