Mandriva Linux Security Advisory : samba (MDVSA-2013:207)

medium Nessus Plugin ID 69230

Synopsis

The remote Mandriva Linux host is missing one or more security updates.

Description

A vulnerability has been found and corrected in samba :

Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet (CVE-2013-4124).

The updated packages for Enterprise Server 5.2 has been patched to correct this issue.

The updated packages for Business Server 1 has been upgraded to the 3.6.17 version which resolves many upstream bugs and is not vulnerable to this issue. Additionally the libtevent packages are being provided which is a requirement since samba 3.6.16.

Solution

Update the affected packages.

See Also

https://www.samba.org/samba/history/samba-3.6.13.html

https://www.samba.org/samba/history/samba-3.6.14.html

https://www.samba.org/samba/history/samba-3.6.15.html

https://www.samba.org/samba/history/samba-3.6.16.html

https://www.samba.org/samba/history/samba-3.6.17.html

http://www.samba.org/samba/security/CVE-2013-4124

Plugin Details

Severity: Medium

ID: 69230

File Name: mandriva_MDVSA-2013-207.nasl

Version: 1.21

Type: local

Published: 8/7/2013

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:lib64netapi-devel, p-cpe:/a:mandriva:linux:lib64netapi0, p-cpe:/a:mandriva:linux:lib64smbclient0, p-cpe:/a:mandriva:linux:lib64smbclient0-devel, p-cpe:/a:mandriva:linux:lib64smbclient0-static-devel, p-cpe:/a:mandriva:linux:lib64smbsharemodes-devel, p-cpe:/a:mandriva:linux:lib64smbsharemodes0, p-cpe:/a:mandriva:linux:lib64tevent-devel, p-cpe:/a:mandriva:linux:lib64tevent0, p-cpe:/a:mandriva:linux:lib64wbclient-devel, p-cpe:/a:mandriva:linux:lib64wbclient0, p-cpe:/a:mandriva:linux:nss_wins, p-cpe:/a:mandriva:linux:python-tevent, p-cpe:/a:mandriva:linux:samba-client, p-cpe:/a:mandriva:linux:samba-common, p-cpe:/a:mandriva:linux:samba-doc, p-cpe:/a:mandriva:linux:samba-domainjoin-gui, p-cpe:/a:mandriva:linux:samba-server, p-cpe:/a:mandriva:linux:samba-swat, p-cpe:/a:mandriva:linux:samba-virusfilter-clamav, p-cpe:/a:mandriva:linux:samba-virusfilter-fsecure, p-cpe:/a:mandriva:linux:samba-virusfilter-sophos, p-cpe:/a:mandriva:linux:samba-winbind, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/6/2013

Reference Information

CVE: CVE-2013-4124

BID: 61597

MDVSA: 2013:207