Vulnerabilities > CVE-2010-0547 - Improper Input Validation vulnerability in Samba

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.

Vulnerable Configurations

Part Description Count
Application
Samba
194

Common Weakness Enumeration (CWE)

Common Attack Pattern Enumeration and Classification (CAPEC)

  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Server Side Include (SSI) Injection
    An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
  • Cross Zone Scripting
    An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security. In a zone-based model, pages belong to one of a set of zones corresponding to the level of privilege assigned to that page. Pages in an untrusted zone would have a lesser level of access to the system and/or be restricted in the types of executable content it was allowed to invoke. In a cross-zone scripting attack, a page that should be assigned to a less privileged zone is granted the privileges of a more trusted zone. This can be accomplished by exploiting bugs in the browser, exploiting incorrect configuration in the zone controls, through a cross-site scripting attack that causes the attackers' content to be treated as coming from a more trusted page, or by leveraging some piece of system functionality that is accessible from both the trusted and less trusted zone. This attack differs from "Restful Privilege Escalation" in that the latter correlates to the inadequate securing of RESTful access methods (such as HTTP DELETE) on the server, while cross-zone scripting attacks the concept of security zones as implemented by a browser.
  • Cross Site Scripting through Log Files
    An attacker may leverage a system weakness where logs are susceptible to log injection to insert scripts into the system's logs. If these logs are later viewed by an administrator through a thin administrative interface and the log data is not properly HTML encoded before being written to the page, the attackers' scripts stored in the log will be executed in the administrative interface with potentially serious consequences. This attack pattern is really a combination of two other attack patterns: log injection and stored cross site scripting.
  • Command Line Execution through SQL Injection
    An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.

Nessus

  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2011-148.NASL
    descriptionMultiple vulnerabilities has been discovered and corrected in samba/cifs-utils : smbfs in Samba 3.5.8 and earlier attempts to use (1) mount.cifs to append to the /etc/mtab file and (2) umount.cifs to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089 (CVE-2011-1678). The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs in Samba 3.5.10 and earlier does not properly verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0547 (CVE-2011-2724). Additionally for Mandriva Linux 2010.2 the cifs-utils package has been upgraded to the 4.8.1 version that brings numerous additional fixes. Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149 products_id=490 The updated packages have been patched to correct these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id56462
    published2011-10-12
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/56462
    titleMandriva Linux Security Advisory : samba (MDVSA-2011:148)
    code
    #%NASL_MIN_LEVEL 80502
    
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Mandriva Linux Security Advisory MDVSA-2011:148. 
    # The text itself is copyright (C) Mandriva S.A.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(56462);
      script_version("1.9");
      script_cvs_date("Date: 2019/08/02 13:32:54");
    
      script_cve_id("CVE-2011-1678", "CVE-2011-2724");
      script_bugtraq_id(38326, 49939);
      script_xref(name:"MDVSA", value:"2011:148");
    
      script_name(english:"Mandriva Linux Security Advisory : samba (MDVSA-2011:148)");
      script_summary(english:"Checks rpm output for the updated packages");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote Mandriva Linux host is missing one or more security
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Multiple vulnerabilities has been discovered and corrected in
    samba/cifs-utils :
    
    smbfs in Samba 3.5.8 and earlier attempts to use (1) mount.cifs to
    append to the /etc/mtab file and (2) umount.cifs to append to the
    /etc/mtab.tmp file without first checking whether resource limits
    would interfere, which allows local users to trigger corruption of the
    /etc/mtab file via a process with a small RLIMIT_FSIZE value, a
    related issue to CVE-2011-1089 (CVE-2011-1678).
    
    The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs
    in Samba 3.5.10 and earlier does not properly verify that the (1)
    device name and (2) mountpoint strings are composed of valid
    characters, which allows local users to cause a denial of service
    (mtab corruption) via a crafted string. NOTE: this vulnerability
    exists because of an incorrect fix for CVE-2010-0547 (CVE-2011-2724).
    
    Additionally for Mandriva Linux 2010.2 the cifs-utils package has been
    upgraded to the 4.8.1 version that brings numerous additional fixes.
    
    Packages for 2009.0 are provided as of the Extended Maintenance
    Program. Please visit this link to learn more:
    http://store.mandriva.com/product_info.php?cPath=149 products_id=490
    
    The updated packages have been patched to correct these issues."
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:cifs-utils");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64netapi-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64netapi0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64smbclient0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64smbclient0-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64smbclient0-static-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64smbsharemodes-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64smbsharemodes0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64talloc-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64talloc1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64tdb-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64tdb1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wbclient-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:lib64wbclient0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnetapi-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libnetapi0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libsmbclient0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libsmbclient0-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libsmbclient0-static-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libsmbsharemodes-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libsmbsharemodes0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libtalloc-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libtalloc1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libtdb-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libtdb1");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwbclient-devel");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:libwbclient0");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:mount-cifs");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:nss_wins");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:samba-client");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:samba-common");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:samba-doc");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:samba-domainjoin-gui");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:samba-server");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:samba-swat");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:samba-winbind");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2009.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2010.1");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:mandriva:linux:2011");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2011/10/11");
      script_set_attribute(attribute:"plugin_publication_date", value:"2011/10/12");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2011-2019 Tenable Network Security, Inc.");
      script_family(english:"Mandriva Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("global_settings.inc");
    include("rpm.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
    if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    cpu = get_kb_item("Host/cpu");
    if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
    if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
    
    
    flag = 0;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64netapi-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64netapi0-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64smbclient0-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64smbclient0-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64smbclient0-static-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64smbsharemodes-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64smbsharemodes0-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64talloc-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64talloc1-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64tdb-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64tdb1-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wbclient-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"x86_64", reference:"lib64wbclient0-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libnetapi-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libnetapi0-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libsmbclient0-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libsmbclient0-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libsmbclient0-static-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libsmbsharemodes-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libsmbsharemodes0-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libtalloc-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libtalloc1-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libtdb-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libtdb1-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwbclient-devel-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", cpu:"i386", reference:"libwbclient0-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", reference:"mount-cifs-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", reference:"nss_wins-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", reference:"samba-client-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", reference:"samba-common-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", reference:"samba-doc-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", reference:"samba-server-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", reference:"samba-swat-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2009.0", reference:"samba-winbind-3.3.12-0.7mdv2009.0", yank:"mdv")) flag++;
    
    if (rpm_check(release:"MDK2010.1", reference:"cifs-utils-4.8.1-0.1mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"x86_64", reference:"lib64netapi-devel-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"x86_64", reference:"lib64netapi0-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"x86_64", reference:"lib64smbclient0-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"x86_64", reference:"lib64smbclient0-devel-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"x86_64", reference:"lib64smbclient0-static-devel-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"x86_64", reference:"lib64smbsharemodes-devel-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"x86_64", reference:"lib64smbsharemodes0-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"x86_64", reference:"lib64wbclient-devel-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"x86_64", reference:"lib64wbclient0-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"i386", reference:"libnetapi-devel-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"i386", reference:"libnetapi0-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"i386", reference:"libsmbclient0-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"i386", reference:"libsmbclient0-devel-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"i386", reference:"libsmbclient0-static-devel-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"i386", reference:"libsmbsharemodes-devel-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"i386", reference:"libsmbsharemodes0-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"i386", reference:"libwbclient-devel-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", cpu:"i386", reference:"libwbclient0-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", reference:"mount-cifs-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", reference:"nss_wins-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", reference:"samba-client-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", reference:"samba-common-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", reference:"samba-doc-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", reference:"samba-domainjoin-gui-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", reference:"samba-server-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", reference:"samba-swat-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2010.1", reference:"samba-winbind-3.5.3-3.4mdv2010.2", yank:"mdv")) flag++;
    
    if (rpm_check(release:"MDK2011", reference:"cifs-utils-4.9-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64netapi-devel-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64netapi0-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64smbclient0-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64smbclient0-devel-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64smbclient0-static-devel-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64smbsharemodes-devel-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64smbsharemodes0-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64wbclient-devel-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"x86_64", reference:"lib64wbclient0-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libnetapi-devel-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libnetapi0-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libsmbclient0-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libsmbclient0-devel-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libsmbclient0-static-devel-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libsmbsharemodes-devel-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libsmbsharemodes0-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libwbclient-devel-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", cpu:"i386", reference:"libwbclient0-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", reference:"mount-cifs-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", reference:"nss_wins-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", reference:"samba-client-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", reference:"samba-common-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", reference:"samba-doc-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", reference:"samba-domainjoin-gui-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", reference:"samba-server-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", reference:"samba-swat-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    if (rpm_check(release:"MDK2011", reference:"samba-winbind-3.5.10-1.1-mdv2011.0", yank:"mdv")) flag++;
    
    
    if (flag)
    {
      if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());
      else security_note(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-1221.NASL
    descriptionUpdated samba and cifs-utils packages that fix multiple security issues and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. The cifs-utils package contains utilities for mounting and managing CIFS (Common Internet File System) shares. A cross-site scripting (XSS) flaw was found in the password change page of the Samba Web Administration Tool (SWAT). If a remote attacker could trick a user, who was logged into the SWAT interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id56001
    published2011-08-30
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56001
    titleRHEL 6 : samba and cifs-utils (RHSA-2011:1221)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20110829_SAMBA3X_ON_SL5_X.NASL
    descriptionSamba is a suite of programs used by machines to share files, printers, and other information. A cross-site scripting (XSS) flaw was found in the password change page of the Samba Web Administration Tool (SWAT). If a remote attacker could trick a user, who was logged into the SWAT interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id61121
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61121
    titleScientific Linux Security Update : samba3x on SL5.x i386/x86_64
  • NASL familyMisc.
    NASL idVMWARE_VMSA-2012-0001_REMOTE.NASL
    descriptionThe remote VMware ESX / ESXi host is missing a security-related patch. It is, therefore, affected by multiple vulnerabilities, including remote code execution vulnerabilities, in several third-party libraries : - COS kernel - cURL - python - rpm
    last seen2020-06-01
    modified2020-06-02
    plugin id89105
    published2016-03-03
    reporterThis script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/89105
    titleVMware ESX / ESXi Service Console and Third-Party Libraries Multiple Vulnerabilities (VMSA-2012-0001) (remote check)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_CIFS-MOUNT-6920.NASL
    descriptionWith enabled
    last seen2020-06-01
    modified2020-06-02
    plugin id45471
    published2010-04-09
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45471
    titleSuSE 10 Security Update : Samba (ZYPP Patch Number 6920)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_2_CIFS-MOUNT-100315.NASL
    descriptionWith enabled
    last seen2020-06-01
    modified2020-06-02
    plugin id45341
    published2010-03-25
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45341
    titleopenSUSE Security Update : cifs-mount (cifs-mount-2128)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-1221.NASL
    descriptionFrom Red Hat Security Advisory 2011:1221 : Updated samba and cifs-utils packages that fix multiple security issues and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. The cifs-utils package contains utilities for mounting and managing CIFS (Common Internet File System) shares. A cross-site scripting (XSS) flaw was found in the password change page of the Samba Web Administration Tool (SWAT). If a remote attacker could trick a user, who was logged into the SWAT interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id68337
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68337
    titleOracle Linux 6 : cifs-utils / samba (ELSA-2011-1221)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-1219.NASL
    descriptionFrom Red Hat Security Advisory 2011:1219 : Updated samba packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A cross-site scripting (XSS) flaw was found in the password change page of the Samba Web Administration Tool (SWAT). If a remote attacker could trick a user, who was logged into the SWAT interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id68335
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68335
    titleOracle Linux 4 / 5 : samba (ELSA-2011-1219)
  • NASL familySuSE Local Security Checks
    NASL idSUSE9_12595.NASL
    descriptionWith enabled
    last seen2020-06-01
    modified2020-06-02
    plugin id45453
    published2010-04-09
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45453
    titleSuSE9 Security Update : Samba (YOU Patch Number 12595)
  • NASL familyOracle Linux Local Security Checks
    NASL idORACLELINUX_ELSA-2011-1220.NASL
    descriptionFrom Red Hat Security Advisory 2011:1220 : Updated samba3x packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A cross-site scripting (XSS) flaw was found in the password change page of the Samba Web Administration Tool (SWAT). If a remote attacker could trick a user, who was logged into the SWAT interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id68336
    published2013-07-12
    reporterThis script is Copyright (C) 2013-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/68336
    titleOracle Linux 5 : samba3x (ELSA-2011-1220)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-9847.NASL
    descriptionThis is an update that fixes a problem with handling embedded newlines in share names or mountpoints. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id55780
    published2011-08-09
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55780
    titleFedora 14 : cifs-utils-4.8.1-7.fc14 (2011-9847)
  • NASL familyVMware ESX Local Security Checks
    NASL idVMWARE_VMSA-2012-0001.NASL
    descriptiona. ESX third-party update for Service Console kernel The ESX Service Console Operating System (COS) kernel is updated to kernel-2.6.18-274.3.1.el5 to fix multiple security issues in the COS kernel. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2011-0726, CVE-2011-1078, CVE-2011-1079, CVE-2011-1080, CVE-2011-1093, CVE-2011-1163, CVE-2011-1166, CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-1494, CVE-2011-1495, CVE-2011-1577, CVE-2011-1763, CVE-2010-4649, CVE-2011-0695, CVE-2011-0711, CVE-2011-1044, CVE-2011-1182, CVE-2011-1573, CVE-2011-1576, CVE-2011-1593, CVE-2011-1745, CVE-2011-1746, CVE-2011-1776, CVE-2011-1936, CVE-2011-2022, CVE-2011-2213, CVE-2011-2492, CVE-2011-1780, CVE-2011-2525, CVE-2011-2689, CVE-2011-2482, CVE-2011-2491, CVE-2011-2495, CVE-2011-2517, CVE-2011-2519, CVE-2011-2901 to these issues. b. ESX third-party update for Service Console cURL RPM The ESX Service Console (COS) curl RPM is updated to cURL-7.15.5.9 resolving a security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2011-2192 to this issue. c. ESX third-party update for Service Console nspr and nss RPMs The ESX Service Console (COS) nspr and nss RPMs are updated to nspr-4.8.8-1.el5_7 and nss-3.12.10-4.el5_7 respectively resolving a security issues. A Certificate Authority (CA) issued fraudulent SSL certificates and Netscape Portable Runtime (NSPR) and Network Security Services (NSS) contain the built-in tokens of this fraudulent Certificate Authority. This update renders all SSL certificates signed by the fraudulent CA as untrusted for all uses. d. ESX third-party update for Service Console rpm RPMs The ESX Service Console Operating System (COS) rpm packages are updated to popt-1.10.2.3-22.el5_7.2, rpm-4.4.2.3-22.el5_7.2, rpm-libs-4.4.2.3-22.el5_7.2 and rpm-python-4.4.2.3-22.el5_7.2 which fixes multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-2059 and CVE-2011-3378 to these issues. e. ESX third-party update for Service Console samba RPMs The ESX Service Console Operating System (COS) samba packages are updated to samba-client-3.0.33-3.29.el5_7.4, samba-common-3.0.33-3.29.el5_7.4 and libsmbclient-3.0.33-3.29.el5_7.4 which fixes multiple security issues in the Samba client. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2010-0547, CVE-2010-0787, CVE-2011-1678, CVE-2011-2522 and CVE-2011-2694 to these issues. Note that ESX does not include the Samba Web Administration Tool (SWAT) and therefore ESX COS is not affected by CVE-2011-2522 and CVE-2011-2694. f. ESX third-party update for Service Console python package The ESX Service Console (COS) python package is updated to 2.4.3-44 which fixes multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-3720, CVE-2010-3493, CVE-2011-1015 and CVE-2011-1521 to these issues. g. ESXi update to third-party component python The python third-party library is updated to python 2.5.6 which fixes multiple security issues. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2009-3560, CVE-2009-3720, CVE-2010-1634, CVE-2010-2089, and CVE-2011-1521 to these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id57749
    published2012-01-31
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/57749
    titleVMSA-2012-0001 : VMware ESXi and ESX updates to third-party library and ESX Service Console
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_CIFS-MOUNT-100312.NASL
    descriptionWith enabled
    last seen2020-06-01
    modified2020-06-02
    plugin id45130
    published2010-03-23
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45130
    titleSuSE 11 Security Update : Samba (SAT Patch Number 2126)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_0_CIFS-MOUNT-100312.NASL
    descriptionWith enabled
    last seen2020-06-01
    modified2020-06-02
    plugin id45339
    published2010-03-25
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45339
    titleopenSUSE Security Update : cifs-mount (cifs-mount-2128)
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-9831.NASL
    descriptionThis is an update that fixes a problem with handling embedded newlines in share names or mountpoints. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id55778
    published2011-08-09
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55778
    titleFedora 15 : cifs-utils-5.0-2.fc15 (2011-9831)
  • NASL familySuSE Local Security Checks
    NASL idSUSE_11_1_CIFS-MOUNT-100312.NASL
    descriptionWith enabled
    last seen2020-06-01
    modified2020-06-02
    plugin id45340
    published2010-03-25
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/45340
    titleopenSUSE Security Update : cifs-mount (cifs-mount-2128)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-2004.NASL
    descriptionTwo local vulnerabilities have been discovered in samba, a SMB/CIFS file, print, and login server for Unix. The Common Vulnerabilities and Exposures project identifies the following problems : - CVE-2009-3297 Ronald Volgers discovered that a race condition in mount.cifs allows local users to mount remote filesystems over arbitrary mount points. - CVE-2010-0547 Jeff Layton discovered that missing input sanitising in mount.cifs allows denial of service by corrupting /etc/mtab.
    last seen2020-06-01
    modified2020-06-02
    plugin id44950
    published2010-03-02
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/44950
    titleDebian DSA-2004-1 : samba - several vulnerabilities
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-1219.NASL
    descriptionUpdated samba packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A cross-site scripting (XSS) flaw was found in the password change page of the Samba Web Administration Tool (SWAT). If a remote attacker could trick a user, who was logged into the SWAT interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id55999
    published2011-08-30
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55999
    titleRHEL 4 / 5 : samba (RHSA-2011:1219)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20110829_SAMBA_AND_CIFS_UTILS_ON_SL6_X.NASL
    descriptionSamba is a suite of programs used by machines to share files, printers, and other information. The cifs-utils package contains utilities for mounting and managing CIFS (Common Internet File System) shares. A cross-site scripting (XSS) flaw was found in the password change page of the Samba Web Administration Tool (SWAT). If a remote attacker could trick a user, who was logged into the SWAT interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id61122
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61122
    titleScientific Linux Security Update : samba and cifs-utils on SL6.x i386/x86_64
  • NASL familySuSE Local Security Checks
    NASL idSUSE_CIFS-MOUNT-6921.NASL
    descriptionWith enabled
    last seen2020-06-01
    modified2020-06-02
    plugin id49834
    published2010-10-11
    reporterThis script is Copyright (C) 2010-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/49834
    titleSuSE 10 Security Update : Samba (ZYPP Patch Number 6921)
  • NASL familyMandriva Local Security Checks
    NASL idMANDRIVA_MDVSA-2010-090.NASL
    descriptionMultiple vulnerabilies has been found and corrected in samba : client/mount.cifs.c in mount.cifs in smbfs in Samba does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string (CVE-2010-0547). client/mount.cifs.c in mount.cifs in smbfs in Samba allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file (CVE-2010-0787). The updated packages have been patched to correct these issues. Update : It was discovered that the previous Samba update required libtalloc from Samba4 package. Therefore, this update provides the required packages in order to fix the issue.
    last seen2020-06-01
    modified2020-06-02
    plugin id46227
    published2010-05-05
    reporterThis script is Copyright (C) 2010-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/46227
    titleMandriva Linux Security Advisory : samba (MDVSA-2010:090-1)
  • NASL familyScientific Linux Local Security Checks
    NASL idSL_20110829_SAMBA_ON_SL4_X.NASL
    descriptionSamba is a suite of programs used by machines to share files, printers, and other information. A cross-site scripting (XSS) flaw was found in the password change page of the Samba Web Administration Tool (SWAT). If a remote attacker could trick a user, who was logged into the SWAT interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id61123
    published2012-08-01
    reporterThis script is Copyright (C) 2012-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/61123
    titleScientific Linux Security Update : samba on SL4.x, SL5.x i386/x86_64
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2011-10028.NASL
    descriptionThis is an update that fixes a problem with handling embedded newlines in share names or mountpoints. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id55944
    published2011-08-23
    reporterThis script is Copyright (C) 2011-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/55944
    titleFedora 16 : cifs-utils-5.0-2.fc16 (2011-10028)
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2011-1220.NASL
    descriptionUpdated samba3x packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A cross-site scripting (XSS) flaw was found in the password change page of the Samba Web Administration Tool (SWAT). If a remote attacker could trick a user, who was logged into the SWAT interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id56272
    published2011-09-23
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56272
    titleCentOS 5 : samba3x (CESA-2011:1220)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2011-1220.NASL
    descriptionUpdated samba3x packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A cross-site scripting (XSS) flaw was found in the password change page of the Samba Web Administration Tool (SWAT). If a remote attacker could trick a user, who was logged into the SWAT interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id56000
    published2011-08-30
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/56000
    titleRHEL 5 : samba3x (RHSA-2011:1220)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-201206-29.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-201206-29 (mount-cifs: Multiple vulnerabilites) Multiple vulnerabilities have been discovered in mount-cifs. Please review the CVE identifiers referenced below for details. Impact : The vulnerabilities allow local users to cause a denial of service (mtab corruption) via a crafted string. Also, local users could mount a CIFS share on an arbitrary mountpoint, and gain privileges via a symlink attack on the mountpoint directory file. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id59702
    published2012-06-26
    reporterThis script is Copyright (C) 2012-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/59702
    titleGLSA-201206-29 : mount-cifs: Multiple vulnerabilites
  • NASL familyCentOS Local Security Checks
    NASL idCENTOS_RHSA-2011-1219.NASL
    descriptionUpdated samba packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having moderate security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Samba is a suite of programs used by machines to share files, printers, and other information. A cross-site scripting (XSS) flaw was found in the password change page of the Samba Web Administration Tool (SWAT). If a remote attacker could trick a user, who was logged into the SWAT interface, into visiting a specially crafted URL, it would lead to arbitrary web script execution in the context of the user
    last seen2020-06-01
    modified2020-06-02
    plugin id55997
    published2011-08-30
    reporterThis script is Copyright (C) 2011-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/55997
    titleCentOS 4 / 5 : samba (CESA-2011:1219)

Redhat

rpms
  • samba3x-0:3.5.4-0.70.el5
  • samba3x-client-0:3.5.4-0.70.el5
  • samba3x-common-0:3.5.4-0.70.el5
  • samba3x-debuginfo-0:3.5.4-0.70.el5
  • samba3x-doc-0:3.5.4-0.70.el5
  • samba3x-domainjoin-gui-0:3.5.4-0.70.el5
  • samba3x-swat-0:3.5.4-0.70.el5
  • samba3x-winbind-0:3.5.4-0.70.el5
  • samba3x-winbind-devel-0:3.5.4-0.70.el5
  • libsmbclient-0:3.0.33-3.29.el5_7.4
  • libsmbclient-devel-0:3.0.33-3.29.el5_7.4
  • samba-0:3.0.33-0.34.el4
  • samba-0:3.0.33-3.29.el5_7.4
  • samba-client-0:3.0.33-0.34.el4
  • samba-client-0:3.0.33-3.29.el5_7.4
  • samba-common-0:3.0.33-0.34.el4
  • samba-common-0:3.0.33-3.29.el5_7.4
  • samba-debuginfo-0:3.0.33-0.34.el4
  • samba-debuginfo-0:3.0.33-3.29.el5_7.4
  • samba-swat-0:3.0.33-0.34.el4
  • samba-swat-0:3.0.33-3.29.el5_7.4

Seebug

bulletinFamilyexploit
descriptionBUGTRAQ ID: 38326 CVE ID: CVE-2010-0547 Samba是一套实现SMB(Server Messages Block)协议、跨平台进行文件共享和打印共享服务的程序。 Samba的mount.cifs工具中的client/mount.cifs.c文件没有正确地验证由有效字符组成的设备名和加载点字符串,这允许本地用户通过特制的字符串导致拒绝服务(mtab破坏)。 Samba 3.4.5 厂商补丁: Debian ------ Debian已经为此发布了一个安全公告(DSA-2004-1)以及相应补丁: DSA-2004-1:New samba packages fix several vulnerabilities 链接:http://www.debian.org/security/2010/dsa-2004 补丁下载: Source archives: http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9.dsc Size/MD5 checksum: 2470 c350b5f777685fe69e0ae2f5dcf810ed http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9.diff.gz Size/MD5 checksum: 239988 82ad8ff6f28af236b321a7eb50d754c8 Architecture independent packages: http://security.debian.org/pool/updates/main/s/samba/samba-doc-pdf_3.2.5-4lenny9_all.deb Size/MD5 checksum: 6252746 f7df1cc363fbcd6ce2da61aaaea2e1c5 http://security.debian.org/pool/updates/main/s/samba/samba-doc_3.2.5-4lenny9_all.deb Size/MD5 checksum: 7950496 68348d1ee83c74096ad02f05ed3b3699 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 1463176 dead0cf63a2ea7de8baf562e1867fe10 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 1333348 80f5022f6b36cab3f2d67bb0ef4b2800 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 638200 c3467c6d11c4b655cfe31e6a19ff0622 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 2574222 491cfc0ee9ce90d6c98347467002c7ef http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 3275458 c3b8ba294354a64c4b7e80ddcd7849cb http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 1941530 14d2c8ffd8544b448eff0d3790e46621 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 6950754 58cffb8cebcaf30c8d8e35916a65fffe http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 3736204 8a467068fa6ff8ef20a61f6277b7d583 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 81568 c70797d1ea795973e6d6639cfd0410fd http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 4834334 c4114837ae9245452a8e8752f7b5343a http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 5733410 59017cdc857eae1a64dcb707365ac78b http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny9_alpha.deb Size/MD5 checksum: 1080474 37190dfe1f9c11ba17aeda1377cc0304 amd64 architecture (AMD x86_64 (AMD64)) http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 1992470 93f2f6a501d8b0c354537d143c962794 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 4781510 b3432114b15d1134e9f88ef8fd5cef8b http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 7006958 656401f8a9bcebd2e0daf05d009d4adb http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 1083040 98380f9059424e4b8cbcb56435586467 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 628388 d5c4908130f2932c7e630bf0fb71868f http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 1358206 e92b4c3d4ee7a0cb1102808b0f479bcb http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 5648010 926ac5718d9c7f45491944b9ecddbf32 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 1955572 6ef5dc332042050c27ce9ab96dd43a0a http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 3276028 b1527124efde3b2e5551fa9680573207 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 1494266 185078508720dd3b5930c06465a0995d http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 80588 f2a8a84e3528b95c65782a3cb34f339b http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny9_amd64.deb Size/MD5 checksum: 3740744 f2c56fbf05935f8fdd0a7b1acce61585 arm architecture (ARM) http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 5041804 17ec9ce0b0e9476f8b98bf36063b5df0 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 4267870 a5e251c739ff83a838b03f0d6764c399 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 6177368 d2140c896a2cfa9e8fd7222709ee088e http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 79528 efce94f03c3257f89cf105a1e943ecba http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 3353546 0fa90fe9a676418b663ad8892b6afd77 http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 2399034 9e2d664559b76868d0667bead3cad3ce http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 2892614 441f28084951ef0dea1d8ffa2d6137d2 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 561446 b8962709de12e2b7e483355019c46a09 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 1817364 62ced50f9c213a2e8c800bc5352c662f http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 972544 62f0a623dc4d9354319ffca2421ef16a http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 1204248 1163a18d6c97e4b46817209c8e2f74fc http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny9_arm.deb Size/MD5 checksum: 1316352 84bbb87072aa207ad4afe5dd88a9f500 armel architecture (ARM EABI) http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 5071106 97a106d71674be953f17f339083da535 http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 2910800 11d8ddb4557c0fb7372e6cc8343130b0 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 79132 4add29b5576fe4d30a759e3eba3a93d4 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 564374 6c5eb08f957c4158d0c31776185740bf http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 4294734 baa5c610c222fe7b484e461fa20be525 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 1210740 4f028be63b6e88caf6edfa67bbd6a2ff http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 1823786 1ef88ad11dbeb601cbb7218ef8446a33 http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 2425120 2e6318bfeba97595191f67f1c5fa5e6f http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 1324336 428eaf85b5e5454034584401f6d2ce7b http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 982218 34bd6f03110c66b35a4236331b1499c5 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 6215120 a721a2bb9e62e291ab83ff26eedaf62d http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny9_armel.deb Size/MD5 checksum: 3372496 db8264837f10ef4764a520c0aebddfb2 hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 3610420 a5916d3de88d013019156341f54a479b http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 81108 4240ebdef0a8b22f5d1c6a3379165764 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 1413152 3554ee16031015b27961935754a47716 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 2229384 2d97c8ed8b5caf3560c93fcb57ad83d7 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 5501292 93612983b1e8f04c3e24f72914db7f53 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 6687792 e7b9d3708978cb2f64dd3929a6fe0a94 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 1375854 f3ab7208ab858e11cd86f4612124d251 http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 1046668 7b39cf96e77638ee2fb46aaa502a0def http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 3177818 00faf13a7fbbe1f998f573e068bbe6fa http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 632108 2703f1403b04dd5f1045fe31ea160edb http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 2067852 076a6a4d253c0504566f9a94e22c4be6 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9_hppa.deb Size/MD5 checksum: 4653586 a1d4e4f3f67708b63c387099c6626733 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 1823542 682b1050f232ceadb18dc8979df57570 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 5068864 f009e30589af4295e040475ca6fd2146 http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 984834 d17d8eb0c46950e7fb3e0ee10bd5d315 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 3409862 0a9992e1716da1f56276825f81490cec http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 2928130 4df6e3ce9043c99d8ba859a0ab19efd0 http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 2082664 717349032021d55f05ab2cf5fa1f58f9 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 1350022 e4c70a2d2a9bf7a023da3d1cf24da8e5 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 79508 8538f6232741624ee538e5169a2626c1 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 561468 244bf102790619264bc6d4fce12bf4e8 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 6304788 ac7f194da34e6363cb8c65a3bb1583f6 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 1200166 f7ddc5b9a70093bd6163df687eb114a1 http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9_i386.deb Size/MD5 checksum: 4295358 0e3b758dea0f72490bec60dd35d9f160 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 84304 0f20e815665230738edda78a2d393275 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 4386736 44c2bab94b6882e62a4ee77d1cbc1f68 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 8295058 9f06b80b653b9da0340f4ca6a7c6d6a7 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 752380 d71e8976ba8d4d3d0b69b158cb37c530 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 6933780 2724767feaddc313b8391ec8db89ef2a http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 2401268 c0d04b98213ada6c226bae0796087d8f http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 5832528 bebeb7c54ede902f9ccf4cb9cd0fbc3f http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 1280376 c002483dae1dfb2c9e66574a1a54b580 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 1561426 514ee394b1674db405acac07fbe7161f http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 1724684 64f04b6f893d499b4004ddd299ffcc50 http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 3915626 ff6374f67ed88d6dc22bc33452fa880b http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny9_ia64.deb Size/MD5 checksum: 1939766 e49b157099db2dbb7a1af1f3cdf09c21 mips architecture (MIPS (Big Endian)) http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 1093902 1a9b8c81b21d950382de5dc9dac61ec6 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 2182482 2637f89bf9108adcdbcf2d99cb8e95df http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 4998930 48d1409f35e9d2fd0f6f5f0aaf56366a http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 572986 6aa1e6021995269549f78ed3bcafa08c http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 2809668 5e9c02e1832a889776b314bbed82a5a3 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 5841264 eb06b2674383addf8477d9ee2f067241 http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 2507278 892aa8720573e572cc8ff42dd075e8c3 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 3239124 a4c88a224df61f0bbc54e87dea3e99f8 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 79594 ce272ecce69206c7bc22c888b359418d http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 1205806 8611ab7991f6e09121bbda33b092b1ad http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 4203548 a6dd8ec04f802507d8e51e9f78c26c6b http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny9_mips.deb Size/MD5 checksum: 942366 aabc925238e075f8f3744c7c44b40e4f mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 1082016 f351b94f4de134809f854d2a2941652e http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 2793406 c8db0453dd55318071d4bcf1252ae633 http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 79514 269977ec2d6a1a9551c0021fab1871e9 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 5801436 634198ec023c9fb2afba8533d168ec40 http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 937206 a129e3579dca0f2e0b4fa66bfc9df693 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 2128634 a3b8e9b7d616884e918ee615a9bb2443 http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 2390238 3cd9bf05564f27964232cfb1d35c0944 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 3219528 f845d56e3b9334401e192fe79f45da9d http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 1196926 d50e00881b8650b92caf40089b5f6552 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 4967686 5cdcd7cfec791f472e4f761a1264098a http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 4178230 4558a771c63c83f92f7276e69fa00dd9 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny9_mipsel.deb Size/MD5 checksum: 569600 61fbc8a1b21c45e080f7c7253a2bcbd4 powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 2078396 375b7b8719ce7d27a65f4063550068f0 http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 989754 3843d901f44ff4c982b82292c3cf2b4a http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 2988350 72e1abd2481e5fca5f13ab926e6439c1 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 1335802 3a0ce75ec8dd000ed1a8a56047b41344 http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 1240416 3e2a10e14a13872718d64e270d2ed36b http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 1714648 0abc5aebba55ff318bda4cc33fbd6531 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 5190642 b32cdb5163b7c49923e14e33f993f93d http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 596034 22ae2b5fa172445e065a820284bae32b http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 80996 60821ef9894750d967c8b8dfa152771e http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 4406486 e74c12d39018c5eb918049a9f43f2bd1 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 6296704 11789a7c80ac1f76f93b66cbc0e25024 http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny9_powerpc.deb Size/MD5 checksum: 3436812 7f637893c3237c1609f8130c740ab444 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/s/samba/samba_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 4321558 45bd9c058b347210a8d073d01dea0d80 http://security.debian.org/pool/updates/main/s/samba/swat_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 978766 a1bbfed8506f7959b8d38dc34d52c4a9 http://security.debian.org/pool/updates/main/s/samba/smbclient_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 6175646 ccbbef75be06864fa4e6e26a13f6de2e http://security.debian.org/pool/updates/main/s/samba/libsmbclient_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 1202346 565f1b01fc3724198f6ecd52709c6a51 http://security.debian.org/pool/updates/main/s/samba/samba-dbg_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 2026382 1da15e63b5f850ac91b266b2917fa865 http://security.debian.org/pool/updates/main/s/samba/smbfs_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 1304294 8d2dc296f6a1bf3280b26c8bd56f1f05 http://security.debian.org/pool/updates/main/s/samba/samba-tools_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 5115064 d32a60f69d2d8b11c127caf52218c996 http://security.debian.org/pool/updates/main/s/samba/libpam-smbpass_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 581974 1224d3e0c417803ac6bb3bef706a1330 http://security.debian.org/pool/updates/main/s/samba/libsmbclient-dev_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 1995210 841952b9e09835556cc9f23e491a8066 http://security.debian.org/pool/updates/main/s/samba/winbind_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 2927968 8b5c038a2395f41e2a835182a3d6c98e http://security.debian.org/pool/updates/main/s/samba/samba-common_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 3380236 45a49dd8180d36e3f2d9b0313344b42b http://security.debian.org/pool/updates/main/s/samba/libwbclient0_3.2.5-4lenny9_sparc.deb Size/MD5 checksum: 79216 4cfbfc843b4fb44adbde9cdb88637404 补丁安装方法: 1. 手工安装补丁包: 首先,使用下面的命令来下载补丁软件: # wget url (url是补丁下载链接地址) 然后,使用下面的命令来安装补丁: # dpkg -i file.deb (file是相应的补丁名) 2. 使用apt-get自动安装补丁包: 首先,使用下面的命令更新内部数据库: # apt-get update 然后,使用下面的命令安装更新软件包: # apt-get upgrade Samba ----- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://git.samba.org/?p=samba.git;a=commit;h=a065c177dfc8f968775593ba00dffafeebb2e054
idSSV:19564
last seen2017-11-19
modified2010-05-06
published2010-05-06
reporterRoot
titleSamba 3.4.5 client/mount.cifs.c本地拒绝服务漏洞