This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
The Samba Team reports :
Secunia Research reported a vulnerability that allows for the
execution of arbitrary code in nmbd. This defect may only be exploited
when the 'wins support' parameter has been enabled in smb.conf.
Samba developers have discovered what is believed to be a
non-exploitable buffer over in nmbd during the processing of GETDC
logon server requests. This code is only used when the Samba server is
configured as a Primary or Backup Domain Controller.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : false
Family: FreeBSD Local Security Checks
Nessus Plugin ID: 28317 (freebsd_pkg_a63b15f997ff11dc9e480016179b2dd5.nasl)
Bugtraq ID: 26454
Get Nessus Professional to scan unlimited IPs, run compliance checks & moreBuy Nessus Professional Now