Samba 3.0.29 - 3.2.4 Potential Memory Disclosure

medium Nessus Plugin ID 34993

Synopsis

The remote Samba server may be affected by an information disclosure vulnerability.

Description

According to its banner, the version of the Samba server on the remote host is between 3.0.29 and 3.2.4 inclusive. Such versions reportedly can potentially leak arbitrary memory contents of the 'smbd' process due to a missing bounds check on client-generated offsets of secondary 'trans', 'trans2', and 'nttrans' requests.

Note that Nessus has not actually tried to exploit this issue or determine if the fix has been applied.

Solution

Upgrade to Samba version 3.2.5 / 3.0.33 or later or apply the appropriate patch referenced in the project's advisory.

See Also

http://www.samba.org/samba/security/CVE-2008-4314.html

https://www.samba.org/samba/history/samba-3.0.33.html

https://www.samba.org/samba/history/samba-3.2.5.html

Plugin Details

Severity: Medium

ID: 34993

File Name: samba_3_2_5.nasl

Version: 1.14

Type: remote

Family: Misc.

Published: 12/1/2008

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:samba:samba

Required KB Items: Settings/ParanoidReport, SMB/samba, SMB/NativeLanManager

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2008-4314

BID: 32494

CWE: 200

Secunia: 32813