Vulnerabilities > CVE-2006-1059 - Unspecified vulnerability in Samba

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
samba
nessus

Summary

The winbindd daemon in Samba 3.0.21 to 3.0.21c writes the machine trust account password in cleartext in log files, which allows local users to obtain the password and spoof the server in the domain.

Vulnerable Configurations

Part Description Count
Application
Samba
4

Nessus

  • NASL familyMisc.
    NASL idSAMBA_LOCAL_INFO_DISCLOSURE.NASL
    descriptionAccording to its version number, the remote Samba server is affected by a flaw that may allow a local attacker to get access to the passwords sent to the winbindd daemon if the debug level has been set to 5 or higher.
    last seen2020-06-01
    modified2020-06-02
    plugin id24684
    published2007-02-22
    reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24684
    titleSamba winbindd Debug Log Server Credentials Local Disclosure
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
     script_id(24684);
     script_version("1.15");
     script_cvs_date("Date: 2018/11/15 20:50:24");
    
     script_cve_id("CVE-2006-1059");
     script_bugtraq_id(17314);
    
     script_name(english:"Samba winbindd Debug Log Server Credentials Local Disclosure");
     script_summary(english:"Checks the version of Samba");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote Samba server is vulnerable to a local information
    disclosure flaw.");
     script_set_attribute(attribute:"description", value:
    "According to its version number, the remote Samba server is affected
    by a flaw that may allow a local attacker to get access to the
    passwords sent to the winbindd daemon if the debug level has been set
    to 5 or higher.");
     script_set_attribute(attribute:"see_also", value:"https://www.securityfocus.com/archive/1/archive/1/429370/100/0/threaded");
     script_set_attribute(attribute:"see_also", value:"https://www.samba.org/samba/security/CVE-2006-1059.html");
     script_set_attribute(attribute:"solution", value:
    "Upgrade to Samba 3.0.22 or set the debug level to a value lower than
    5.");
     script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:P/I:N/A:N");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
    
     script_set_attribute(attribute:"vuln_publication_date", value:"2006/03/29");
     script_set_attribute(attribute:"plugin_publication_date", value:"2007/02/22");
    
     script_set_attribute(attribute:"potential_vulnerability", value:"true");
     script_set_attribute(attribute:"plugin_type", value:"remote");
     script_set_attribute(attribute:"cpe", value:"cpe:/a:samba:samba");
     script_end_attributes();
    
     script_category(ACT_GATHER_INFO);
     script_copyright(english:"This script is Copyright (C) 2007-2018 Tenable Network Security, Inc.");
     script_family(english:"Misc.");
    
     script_dependencie("smb_nativelanman.nasl");
     script_require_keys("SMB/NativeLanManager", "Settings/ParanoidReport");
    
     exit(0);
    }
    
    include("audit.inc");
    include("global_settings.inc");
    
    if (report_paranoia < 2) audit(AUDIT_PARANOID);
    
    lanman = get_kb_item("SMB/NativeLanManager");
    if("Samba" >< lanman)
    {
     if(ereg(pattern:"Samba 3\.0\.21($|[a-c]$)", string:lanman))
       security_note(get_kb_item("SMB/transport"));
    }
    
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2006-259.NASL
    description--------------------------------------------------------------------- - Thu Mar 30 2006 Jay Fenlason <fenlason at redhat.com> 2.0.21c-1.fc5 - New upstream version, fixing bz#187170 CVE-2005-1059 Samba clear text password exposure - include gnutls-devel in BuildRequires Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id21169
    published2006-04-03
    reporterThis script is Copyright (C) 2006-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/21169
    titleFedora Core 5 : samba-3.0.22-1.fc5 (2006-259)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Fedora Security Advisory 2006-259.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(21169);
      script_version ("1.13");
      script_cvs_date("Date: 2019/08/02 13:32:24");
    
      script_cve_id("CVE-2006-1059");
      script_xref(name:"FEDORA", value:"2006-259");
    
      script_name(english:"Fedora Core 5 : samba-3.0.22-1.fc5 (2006-259)");
      script_summary(english:"Checks rpm output for the updated packages.");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Fedora Core host is missing a security update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "---------------------------------------------------------------------
    
      - Thu Mar 30 2006 Jay Fenlason <fenlason at redhat.com>
        2.0.21c-1.fc5
    
        - New upstream version, fixing bz#187170 CVE-2005-1059
          Samba clear text password exposure
    
      - include gnutls-devel in BuildRequires
    
    Note that Tenable Network Security has extracted the preceding
    description block directly from the Fedora security advisory. Tenable
    has attempted to automatically clean and format it as much as possible
    without introducing additional issues."
      );
      # https://lists.fedoraproject.org/pipermail/announce/2006-March/001962.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?b6213f30"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:H/Au:N/C:P/I:N/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:samba");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:samba-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:samba-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:samba-debuginfo");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:samba-swat");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora_core:5");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2006/03/30");
      script_set_attribute(attribute:"plugin_publication_date", value:"2006/04/03");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2006-2019 Tenable Network Security, Inc.");
      script_family(english:"Fedora Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    release = get_kb_item("Host/RedHat/release");
    if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
    os_ver = eregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
    if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
    os_ver = os_ver[1];
    if (! ereg(pattern:"^5([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 5.x", "Fedora " + os_ver);
    
    if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
    
    flag = 0;
    if (rpm_check(release:"FC5", reference:"samba-3.0.22-1.fc5")) flag++;
    if (rpm_check(release:"FC5", reference:"samba-client-3.0.22-1.fc5")) flag++;
    if (rpm_check(release:"FC5", reference:"samba-common-3.0.22-1.fc5")) flag++;
    if (rpm_check(release:"FC5", reference:"samba-debuginfo-3.0.22-1.fc5")) flag++;
    if (rpm_check(release:"FC5", reference:"samba-swat-3.0.22-1.fc5")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
      else security_note(0);
      exit(0);
    }
    else
    {
      tested = pkg_tests_get();
      if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
      else audit(AUDIT_PACKAGE_NOT_INSTALLED, "samba / samba-client / samba-common / samba-debuginfo / samba-swat");
    }
    
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_92FD40EBC45811DA9C7900123FFE8333.NASL
    descriptionSamba Security Advisory : The machine trust account password is the secret shared between a domain controller and a specific member server. Access to the member server machine credentials allows an attacker to impersonate the server in the domain and gain access to additional information regarding domain users and groups. The winbindd daemon writes the clear text of server
    last seen2020-06-01
    modified2020-06-02
    plugin id21476
    published2006-05-13
    reporterThis script is Copyright (C) 2006-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/21476
    titleFreeBSD : samba -- Exposure of machine account credentials in winbind log files (92fd40eb-c458-11da-9c79-00123ffe8333)