FreeBSD : samba -- multiple vulnerabilities (a63b15f9-97ff-11dc-9e48-0016179b2dd5)

This script is Copyright (C) 2007-2016 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

The Samba Team reports :

Secunia Research reported a vulnerability that allows for the
execution of arbitrary code in nmbd. This defect may only be exploited
when the 'wins support' parameter has been enabled in smb.conf.

Samba developers have discovered what is believed to be a
non-exploitable buffer over in nmbd during the processing of GETDC
logon server requests. This code is only used when the Samba server is
configured as a Primary or Backup Domain Controller.

See also :

http://us1.samba.org/samba/security/CVE-2007-4572.html
http://us1.samba.org/samba/security/CVE-2007-5398.html
http://www.nessus.org/u?fd6537b5

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.1
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 28317 (freebsd_pkg_a63b15f997ff11dc9e480016179b2dd5.nasl)

Bugtraq ID: 26454

CVE ID: CVE-2007-4572
CVE-2007-5398

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now