This script is Copyright (C) 2008-2015 Tenable Network Security, Inc.
The remote Fedora host is missing a security update.
Fix CVE-2008-1105 A heap-based buffer overflow flaw has been found in
the way Samba clients handle over-sized packets. If a client connected
to a malicious Samba server, it was possible to execute arbitrary code
as the Samba client user. The Samba server can also act as a client to
perform some operations (print notify, domain member vs domain
controler ...). This could result in the server executing the
vulnerable client code, resulting in arbitrary code execution with the
permissions of the Samba server.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
See also :
Update the affected samba package.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.9
Public Exploit Available : true