Debian DSA-2966-1 : samba - security update

Low Nessus Plugin ID 76194


The remote Debian host is missing a security-related update.


Multiple vulnerabilities were discovered and fixed in Samba, a SMB/CIFS file, print, and login server :

- CVE-2014-0178 Information leak vulnerability in the VFS code, allowing an authenticated user to retrieve eight bytes of uninitialized memory when shadow copy is enabled.

- CVE-2014-0244 Denial of service (infinite CPU loop) in the nmbd Netbios name service daemon. A malformed packet can cause the nmbd server to enter an infinite loop, preventing it to process later requests to the Netbios name service.

- CVE-2014-3493 Denial of service (daemon crash) in the smbd file server daemon. An authenticated user attempting to read a Unicode path using a non-Unicode request can force the daemon to overwrite memory at an invalid address.


Upgrade the samba packages.

For the stable distribution (wheezy), these problems have been fixed in version 2:3.6.6-6+deb7u4.

See Also

Plugin Details

Severity: Low

ID: 76194

File Name: debian_DSA-2966.nasl

Version: 1.9

Type: local

Agent: unix

Published: 2014/06/24

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: Low

CVSS v2.0

Base Score: 3.5

Temporal Score: 3

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:samba, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/06/23

Reference Information

CVE: CVE-2014-0178, CVE-2014-0244, CVE-2014-3493

BID: 67686, 68148, 68150

DSA: 2966