SUSE-SA:2003:025: samba

Critical Nessus Plugin ID 13795


The remote host is missing a vendor-supplied security patch.


The remote host is missing a security patch for samba. It is, therefore, affected by a buffer overflow condition in the call_trans2open() function within file trans2.c due to improper sanitization of user-supplied input. An unauthenticated, remote attacker can exploit this, via an overly long string passed to the pname variable, to execute arbitrary code with the privileges of the server.


Update the affected samba and samba-client packages according to the SUSE-SA:2003:025 security announcement.

See Also

Plugin Details

Severity: Critical

ID: 13795

File Name: suse_SA_2003_025.nasl

Version: $Revision: 1.15 $

Type: local

Agent: unix

Published: 2004/07/25

Modified: 2017/08/16

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:samba:samba

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2003/04/07

Vulnerability Publication Date: 2003/04/07

Exploitable With


Metasploit (Samba trans2open Overflow (Solaris SPARC))

Reference Information

CVE: CVE-2003-0201

BID: 7294

OSVDB: 4469

CERT: 267873