FreeBSD : Multiple Potential Buffer Overruns in Samba (2de14f7a-dad9-11d8-b59a-00061bc2ad93)

Critical Nessus Plugin ID 37185


The remote FreeBSD host is missing one or more security-related updates.


Evgeny Demidov discovered that the Samba server has a buffer overflow in the Samba Web Administration Tool (SWAT) on decoding Base64 data during HTTP Basic Authentication. Versions 3.0.2 through 3.0.4 are affected.

Another buffer overflow bug has been found in the code used to support the 'mangling method = hash' smb.conf option. The default setting for this parameter is 'mangling method = hash2' and therefore not vulnerable. Versions between 2.2.0 through 2.2.9 and 3.0.0 through 3.0.4 are affected.


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 37185

File Name: freebsd_pkg_2de14f7adad911d8b59a00061bc2ad93.nasl

Version: $Revision: 1.12 $

Type: local

Published: 2009/04/23

Modified: 2015/05/13

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:freebsd:freebsd:ja-samba, p-cpe:/a:freebsd:freebsd:samba, cpe:/o:freebsd:freebsd

Required KB Items: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info

Patch Publication Date: 2004/07/21

Vulnerability Publication Date: 2004/07/14

Reference Information

CVE: CVE-2004-0600, CVE-2004-0686

OSVDB: 8190, 8191

Secunia: 12130