Mandriva Linux Security Advisory : samba (MDVSA-2010:141)

medium Nessus Plugin ID 48199

Language:

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

Multiple vulnerabilities has been discovered and corrected in samba :

The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value (CVE-2010-1635).

The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request (CVE-2010-1642).

The updated packages provides samba 3.4.8 which is not vulnerable to these issues.

Solution

Update the affected packages.

See Also

https://www.samba.org/samba/history/samba-3.4.8.html

Plugin Details

Severity: Medium

ID: 48199

File Name: mandriva_MDVSA-2010-141.nasl

Version: 1.12

Type: local

Published: 7/30/2010

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64netapi-devel, p-cpe:/a:mandriva:linux:lib64netapi0, p-cpe:/a:mandriva:linux:lib64smbclient0, p-cpe:/a:mandriva:linux:lib64smbclient0-devel, p-cpe:/a:mandriva:linux:lib64smbclient0-static-devel, p-cpe:/a:mandriva:linux:lib64smbsharemodes-devel, p-cpe:/a:mandriva:linux:lib64smbsharemodes0, p-cpe:/a:mandriva:linux:lib64wbclient-devel, p-cpe:/a:mandriva:linux:lib64wbclient0, p-cpe:/a:mandriva:linux:libnetapi-devel, p-cpe:/a:mandriva:linux:libnetapi0, p-cpe:/a:mandriva:linux:libsmbclient0, p-cpe:/a:mandriva:linux:libsmbclient0-devel, p-cpe:/a:mandriva:linux:libsmbclient0-static-devel, p-cpe:/a:mandriva:linux:libsmbsharemodes-devel, p-cpe:/a:mandriva:linux:libsmbsharemodes0, p-cpe:/a:mandriva:linux:libwbclient-devel, p-cpe:/a:mandriva:linux:libwbclient0, p-cpe:/a:mandriva:linux:mount-cifs, p-cpe:/a:mandriva:linux:nss_wins, p-cpe:/a:mandriva:linux:samba-client, p-cpe:/a:mandriva:linux:samba-common, p-cpe:/a:mandriva:linux:samba-doc, p-cpe:/a:mandriva:linux:samba-server, p-cpe:/a:mandriva:linux:samba-swat, p-cpe:/a:mandriva:linux:samba-winbind, cpe:/o:mandriva:linux:2010.0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/27/2010

Reference Information

CVE: CVE-2010-1635, CVE-2010-1642

BID: 40097

MDVSA: 2010:141