FreeBSD : samba -- integer overflow vulnerability (3b3676be-52e1-11d9-a9e7-0001020eed82)

critical Nessus Plugin ID 18904

Synopsis

The remote FreeBSD host is missing one or more security-related updates.

Description

Greg MacManus, iDEFENSE Labs reports :

Remote exploitation of an integer overflow vulnerability in the smbd daemon included in Samba 2.0.x, Samba 2.2.x, and Samba 3.0.x prior to and including 3.0.9 could allow an attacker to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges.

Successful remote exploitation allows an attacker to gain root privileges on a vulnerable system. In order to exploit this vulnerability an attacker must possess credentials that allow access to a share on the Samba server. Unsuccessful exploitation attempts will cause the process serving the request to crash with signal 11, and may leave evidence of an attack in logs.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?847343d8

https://www.samba.org/samba/security/CVE-2004-1154.html

http://www.nessus.org/u?2fdd4ba3

Plugin Details

Severity: Critical

ID: 18904

File Name: freebsd_pkg_3b3676be52e111d9a9e70001020eed82.nasl

Version: 1.24

Type: local

Published: 7/13/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ja-samba, p-cpe:/a:freebsd:freebsd:samba, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 12/21/2004

Vulnerability Publication Date: 12/2/2004

Reference Information

CVE: CVE-2004-1154