Samba 4.x < 4.0.1 Remote Security Bypass

medium Nessus Network Monitor Plugin ID 9345

Synopsis

The remote Samba server is affected by a remote security bypass attack vector.

Description

According to its banner, the version of Samba is 4.x earlier than 4.0.1. It is therefore affected by a flaw when acting as an AD (Active Directory) DC (Domain Controller). The vulnerability is triggered when a user or group is granted any access to a LDAP directory object based on objectClass or granted write access to any attribute on the object. This results in an authenticated user automatically being granted write access to the object or all attributes.

Solution

Upgrade Samba to version 4.0.1 or later.

See Also

https://www.samba.org/samba/history/samba-2.2.11.html

Plugin Details

Severity: Medium

ID: 9345

Family: Samba

Published: 6/9/2016

Updated: 3/6/2019

Nessus ID: 63561

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:samba:samba

Patch Publication Date: 1/15/2013

Vulnerability Publication Date: 1/15/2013

Reference Information

CVE: CVE-2013-0172

BID: 57329