Samba 4.0.x < 4.0.18 / 4.1.x < 4.1.8 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 3540

Synopsis

The remote version of Samba is outdated and thus affected by several vulnerabilities.

Description

Versions of Samba older than 4.0.18 or 4.1.8 are unpatched for the following vulnerabilities:

- An error in the 'dns_process_send()' function in the internal DNS server can cause an infinite loop that results in denial of service, due to the server not checking the 'reply' flag in a DNS packet header when processing a request. (CVE-2014-0239)

- A flaw in the 'vfswrap_fsctl()' function that is triggered when responding to authenticated FSCTL_GET_SHADOW_COPY_DATA or FSCTL_SRV_ENUMERATE_SNAPSHOTS client requests can result in the exposure of eight bytes of uninitialized memory. This affects versions of Samba 3.6.6 and onward. (CVE-2014-0178)

Solution

Install the patch referenced in the project's advisory, or upgrade to 4.0.18, 4.1.8, or later.

See Also

http://www.samba.org/samba/security/CVE-2014-0178

http://www.samba.org/samba/security/CVE-2014-0239

http://www.samba.org/samba/history/samba-4.1.8.html

http://www.samba.org/samba/history/samba-4.0.18.html

Plugin Details

Severity: Medium

ID: 3540

Family: Samba

Published: 6/9/2014

Updated: 3/6/2019

Nessus ID: 74242

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:samba:samba

Patch Publication Date: 5/28/2014

Vulnerability Publication Date: 5/28/2014

Reference Information

CVE: CVE-2014-0178, CVE-2014-0239

BID: 67686, 67691