FreeBSD : samba -- multiple vulnerabilities (a63b15f9-97ff-11dc-9e48-0016179b2dd5)

High Nessus Plugin ID 28317


The remote FreeBSD host is missing one or more security-related updates.


The Samba Team reports :

Secunia Research reported a vulnerability that allows for the execution of arbitrary code in nmbd. This defect may only be exploited when the 'wins support' parameter has been enabled in smb.conf.

Samba developers have discovered what is believed to be a non-exploitable buffer over in nmbd during the processing of GETDC logon server requests. This code is only used when the Samba server is configured as a Primary or Backup Domain Controller.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 28317

File Name: freebsd_pkg_a63b15f997ff11dc9e480016179b2dd5.nasl

Version: $Revision: 1.17 $

Type: local

Published: 2007/11/26

Modified: 2016/05/05

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ja-samba, p-cpe:/a:freebsd:freebsd:samba, p-cpe:/a:freebsd:freebsd:samba3, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2007/11/21

Vulnerability Publication Date: 2007/11/15

Reference Information

CVE: CVE-2007-4572, CVE-2007-5398

BID: 26454

Secunia: 27450

CWE: 119