FreeBSD : Multiple Potential Buffer Overruns in Samba (2de14f7a-dad9-11d8-b59a-00061bc2ad93)

critical Nessus Plugin ID 37185

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Evgeny Demidov discovered that the Samba server has a buffer overflow in the Samba Web Administration Tool (SWAT) on decoding Base64 data during HTTP Basic Authentication. Versions 3.0.2 through 3.0.4 are affected.

Another buffer overflow bug has been found in the code used to support the 'mangling method = hash' smb.conf option. The default setting for this parameter is 'mangling method = hash2' and therefore not vulnerable. Versions between 2.2.0 through 2.2.9 and 3.0.0 through 3.0.4 are affected.

Solution

Update the affected packages.

See Also

https://www.securityfocus.com/archive/1/369698

https://www.securityfocus.com/archive/1/369706

https://www.samba.org/samba/history/samba-3.0.5.html

https://www.samba.org/samba/history/samba-2.2.10.html

http://www.nessus.org/u?78bde05c

Plugin Details

Severity: Critical

ID: 37185

File Name: freebsd_pkg_2de14f7adad911d8b59a00061bc2ad93.nasl

Version: 1.17

Type: local

Published: 4/23/2009

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ja-samba, p-cpe:/a:freebsd:freebsd:samba, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 7/21/2004

Vulnerability Publication Date: 7/14/2004

Reference Information

CVE: CVE-2004-0600, CVE-2004-0686

Secunia: 12130