Vulnerabilities > CVE-2015-2535 - Code vulnerability in Microsoft Windows Server 2008 and Windows Server 2012

047910
CVSS 4.0 - MEDIUM
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
SINGLE
Confidentiality impact
NONE
Integrity impact
NONE
Availability impact
PARTIAL
network
low complexity
microsoft
CWE-17
nessus

Summary

Active Directory in Microsoft Windows Server 2008 SP2 and R2 SP1 and Server 2012 Gold and R2 allows remote authenticated users to cause a denial of service (service outage) by creating multiple machine accounts, aka "Active Directory Denial of Service Vulnerability."

Common Weakness Enumeration (CWE)

Msbulletin

bulletin_idMS15-096
bulletin_url
date2015-09-08T00:00:00
impactDenial of Service
knowledgebase_id3072595
knowledgebase_url
severityImportant
titleVulnerability in Active Directory Service Could Allow Denial of Service

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_EF434839A6A411E58275000C292E4FD8.NASL
    descriptionSamba team reports : [CVE-2015-3223] Malicious request can cause Samba LDAP server to hang, spinning using CPU. [CVE-2015-5330] Malicious request can cause Samba LDAP server to return uninitialized memory that should not be part of the reply. [CVE-2015-5296] Requesting encryption should also request signing when setting up the connection to protect against man-in-the-middle attacks. [CVE-2015-5299] A missing access control check in the VFS shadow_copy2 module could allow unauthorized users to access snapshots. [CVE-2015-7540] Malicious request can cause Samba LDAP server to return crash. [CVE-2015-8467] Samba can expose Windows DCs to MS15-096 Denial of service via the creation of multiple machine accounts(The Microsoft issue is CVE-2015-2535). [CVE-2015-5252] Insufficient symlink verification could allow data access outside share path.
    last seen2020-06-01
    modified2020-06-02
    plugin id87514
    published2015-12-21
    reporterThis script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87514
    titleFreeBSD : samba -- multiple vulnerabilities (ef434839-a6a4-11e5-8275-000c292e4fd8)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2018 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(87514);
      script_version("2.9");
      script_cvs_date("Date: 2018/11/10 11:49:44");
    
      script_cve_id("CVE-2015-3223", "CVE-2015-5252", "CVE-2015-5296", "CVE-2015-5299", "CVE-2015-5330", "CVE-2015-7540", "CVE-2015-8467");
    
      script_name(english:"FreeBSD : samba -- multiple vulnerabilities (ef434839-a6a4-11e5-8275-000c292e4fd8)");
      script_summary(english:"Checks for updated packages in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote FreeBSD host is missing one or more security-related
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Samba team reports :
    
    [CVE-2015-3223] Malicious request can cause Samba LDAP server to hang,
    spinning using CPU.
    
    [CVE-2015-5330] Malicious request can cause Samba LDAP server to
    return uninitialized memory that should not be part of the reply.
    
    [CVE-2015-5296] Requesting encryption should also request signing when
    setting up the connection to protect against man-in-the-middle
    attacks.
    
    [CVE-2015-5299] A missing access control check in the VFS shadow_copy2
    module could allow unauthorized users to access snapshots.
    
    [CVE-2015-7540] Malicious request can cause Samba LDAP server to
    return crash.
    
    [CVE-2015-8467] Samba can expose Windows DCs to MS15-096 Denial of
    service via the creation of multiple machine accounts(The Microsoft
    issue is CVE-2015-2535).
    
    [CVE-2015-5252] Insufficient symlink verification could allow data
    access outside share path."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.samba.org/samba/security/CVE-2015-3223.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.samba.org/samba/security/CVE-2015-5252.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.samba.org/samba/security/CVE-2015-5296.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.samba.org/samba/security/CVE-2015-5299.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.samba.org/samba/security/CVE-2015-5330.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.samba.org/samba/security/CVE-2015-7540.html"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.samba.org/samba/security/CVE-2015-8467.html"
      );
      # https://vuxml.freebsd.org/freebsd/ef434839-a6a4-11e5-8275-000c292e4fd8.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?3811beb1"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:ldb");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:samba36");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:samba4");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:samba41");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:samba42");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:samba43");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/12/16");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/12/19");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/12/21");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2015-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"samba36>=3.6.0<3.6.25_2")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"samba4>=4.0.0<=4.0.26")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"samba41>=4.1.0<4.1.22")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"samba42>=4.2.0<4.2.7")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"samba43>=4.3.0<4.3.3")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"ldb>=1.0.0<1.1.24")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyWindows : Microsoft Bulletins
    NASL idSMB_NT_MS15-096.NASL
    descriptionThe remote Windows host is affected by a denial of service vulnerability in Active Directory that is triggered during the handling of a saturation of account creations. An authenticated, remote attacker, with privileges to join machines to a domain, can exploit this vulnerability by creating multiple machine accounts, resulting in the Active Directory service becoming non-responsive.
    last seen2020-06-01
    modified2020-06-02
    plugin id85846
    published2015-09-08
    reporterThis script is Copyright (C) 2015-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/85846
    titleMS15-096: Vulnerability in Active Directory Service Could Allow Denial of Service (3072595)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(85846);
      script_version("1.7");
      script_cvs_date("Date: 2018/11/15 20:50:31");
    
      script_cve_id("CVE-2015-2535");
      script_bugtraq_id(76554);
      script_xref(name:"MSFT", value:"MS15-096");
      script_xref(name:"MSKB", value:"3072595");
      script_xref(name:"IAVB", value:"2015-B-0110");
    
      script_name(english:"MS15-096: Vulnerability in Active Directory Service Could Allow Denial of Service (3072595)");
      script_summary(english:"Checks the version of samsrv.dll.");
    
      script_set_attribute(attribute:"synopsis", value:
    "The remote Windows host is affected by a denial of service
    vulnerability.");
      script_set_attribute(attribute:"description", value:
    "The remote Windows host is affected by a denial of service
    vulnerability in Active Directory that is triggered during the
    handling of a saturation of account creations. An authenticated,
    remote attacker, with privileges to join machines to a domain, can
    exploit this vulnerability by creating multiple machine accounts,
    resulting in the Active Directory service becoming non-responsive.");
      script_set_attribute(attribute:"see_also", value:"https://docs.microsoft.com/en-us/security-updates/SecurityBulletins/2015/ms15-096");
      script_set_attribute(attribute:"solution", value:
    "Microsoft has released a set of patches for Windows 2008, 2008 R2,
    2012, and 2012 R2.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2015/09/08");
      script_set_attribute(attribute:"patch_publication_date", value:"2015/09/08");
      script_set_attribute(attribute:"plugin_publication_date", value:"2015/09/08");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows");
      script_set_attribute(attribute:"stig_severity", value:"II");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_family(english:"Windows : Microsoft Bulletins");
    
      script_copyright(english:"This script is Copyright (C) 2015-2018 Tenable Network Security, Inc.");
    
      script_dependencies("smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
      script_require_keys("SMB/MS_Bulletin_Checks/Possible");
      script_require_ports(139, 445, "Host/patch_management_checks");
    
      exit(0);
    }
    
    include("audit.inc");
    include("smb_hotfixes_fcheck.inc");
    include("smb_hotfixes.inc");
    include("smb_func.inc");
    include("misc_func.inc");
    
    get_kb_item_or_exit("SMB/MS_Bulletin_Checks/Possible");
    
    bulletin = 'MS15-096';
    kbs = make_list('3072595');
    
    if (get_kb_item("Host/patch_management_checks")) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);
    
    get_kb_item_or_exit("SMB/Registry/Enumerated");
    get_kb_item_or_exit("SMB/WindowsVersion", exit_code:1);
    
    if (hotfix_check_sp_range(vista:'2', win7:'1', win8:'0', win81:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
    
    # Vista, 7, 8, 8.1 are not affected
    productname = get_kb_item_or_exit("SMB/ProductName", exit_code:1);
    if (
      "Windows 7" >< productname ||
      "Windows 8" >< productname ||
      "Windows Embedded" >< productname ||
      "Windows Vista" >< productname
    ) exit(0, "The host is running "+productname+" and hence is not affected.");
    
    share = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);
    if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
    
    if (
      # Windows Server 2012 R2
      hotfix_is_vulnerable(os:"6.3", sp:0, file:"samsrv.dll", version:"6.3.9600.18009", min_version:"6.3.9600.16000", dir:"\system32", bulletin:bulletin, kb:"3072595") ||
    
      # Windows Server 2012
      hotfix_is_vulnerable(os:"6.2", sp:0, file:"samsrv.dll", version:"6.2.9200.21585", min_version:"6.2.9200.20000", dir:"\system32", bulletin:bulletin, kb:"3072595") ||
      hotfix_is_vulnerable(os:"6.2", sp:0, file:"samsrv.dll", version:"6.2.9200.17469", min_version:"6.2.9200.16000", dir:"\system32", bulletin:bulletin, kb:"3072595") ||
    
      # Server 2008 R2
      hotfix_is_vulnerable(os:"6.1", sp:1, file:"samsrv.dll", version:"6.1.7601.23159", min_version:"6.1.7601.22000", dir:"\system32", bulletin:bulletin, kb:"3072595") ||
      hotfix_is_vulnerable(os:"6.1", sp:1, file:"samsrv.dll", version:"6.1.7601.18956", min_version:"6.1.7600.16000", dir:"\system32", bulletin:bulletin, kb:"3072595") ||
    
      # Windows Server 2008
      hotfix_is_vulnerable(os:"6.0", sp:2, file:"samsrv.dll", version:"6.0.6002.23777", min_version:"6.0.6002.23000", dir:"\system32", bulletin:bulletin, kb:"3072595") ||
      hotfix_is_vulnerable(os:"6.0", sp:2, file:"samsrv.dll", version:"6.0.6002.19467", min_version:"6.0.6001.18000", dir:"\system32", bulletin:bulletin, kb:"3072595")
    )
    {
      set_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
      hotfix_security_warning();
      hotfix_check_fversion_end();
      exit(0);
    }
    else
    {
      hotfix_check_fversion_end();
      audit(AUDIT_HOST_NOT, 'affected');
    }
    
    
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-3433.NASL
    descriptionSeveral vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix. The Common Vulnerabilities and Exposures project identifies the following issues : - CVE-2015-3223 Thilo Uttendorfer of Linux Information Systems AG discovered that a malicious request can cause the Samba LDAP server to hang, spinning using CPU. A remote attacker can take advantage of this flaw to mount a denial of service. - CVE-2015-5252 Jan
    last seen2020-06-01
    modified2020-06-02
    plugin id87684
    published2016-01-04
    reporterThis script is Copyright (C) 2016-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/87684
    titleDebian DSA-3433-1 : samba - security update
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from Debian Security Advisory DSA-3433. The text 
    # itself is copyright (C) Software in the Public Interest, Inc.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(87684);
      script_version("2.9");
      script_cvs_date("Date: 2018/11/10 11:49:37");
    
      script_cve_id("CVE-2015-3223", "CVE-2015-5252", "CVE-2015-5296", "CVE-2015-5299", "CVE-2015-5330", "CVE-2015-7540", "CVE-2015-8467");
      script_xref(name:"DSA", value:"3433");
    
      script_name(english:"Debian DSA-3433-1 : samba - security update");
      script_summary(english:"Checks dpkg output for the updated package");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:"The remote Debian host is missing a security-related update."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "Several vulnerabilities have been discovered in Samba, a SMB/CIFS
    file, print, and login server for Unix. The Common Vulnerabilities and
    Exposures project identifies the following issues :
    
      - CVE-2015-3223
        Thilo Uttendorfer of Linux Information Systems AG
        discovered that a malicious request can cause the Samba
        LDAP server to hang, spinning using CPU. A remote
        attacker can take advantage of this flaw to mount a
        denial of service.
    
      - CVE-2015-5252
        Jan 'Yenya' Kasprzak and the Computer Systems Unit team
        at Faculty of Informatics, Masaryk University discovered
        that insufficient symlink verification could allow data
        access outside an exported share path.
    
      - CVE-2015-5296
        Stefan Metzmacher of SerNet discovered that Samba does
        not ensure that signing is negotiated when creating an
        encrypted client connection to a server. This allows a
        man-in-the-middle attacker to downgrade the connection
        and connect using the supplied credentials as an
        unsigned, unencrypted connection.
    
      - CVE-2015-5299
        It was discovered that a missing access control check in
        the VFS shadow_copy2 module could allow unauthorized
        users to access snapshots.
    
      - CVE-2015-5330
        Douglas Bagnall of Catalyst discovered that the Samba
        LDAP server is vulnerable to a remote memory read
        attack. A remote attacker can obtain sensitive
        information from daemon heap memory by sending crafted
        packets and then either read an error message, or a
        database value.
    
      - CVE-2015-7540
        It was discovered that a malicious client can send
        packets that cause the LDAP server provided by the AD DC
        in the samba daemon process to consume unlimited memory
        and be terminated.
    
      - CVE-2015-8467
        Andrew Bartlett of the Samba Team and Catalyst
        discovered that a Samba server deployed as an AD DC can
        expose Windows DCs in the same domain to a denial of
        service via the creation of multiple machine accounts.
        This issue is related to the MS15-096 / CVE-2015-2535
        security issue in Windows."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-3223"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-5252"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-5296"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-5299"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-5330"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-7540"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-8467"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-2535"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-5252"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-5296"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-5299"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-3223"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-5330"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-3223"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://security-tracker.debian.org/tracker/CVE-2015-5330"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/wheezy/samba"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://packages.debian.org/source/jessie/samba"
      );
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.debian.org/security/2016/dsa-3433"
      );
      script_set_attribute(
        attribute:"solution", 
        value:
    "Upgrade the samba packages.
    
    For the oldstable distribution (wheezy), these problems have been
    fixed in version 2:3.6.6-6+deb7u6. The oldstable distribution (wheezy)
    is only affected by CVE-2015-5252, CVE-2015-5296 and CVE-2015-5299.
    
    For the stable distribution (jessie), these problems have been fixed
    in version 2:4.1.17+dfsg-2+deb8u1. The fixes for CVE-2015-3223 and
    CVE-2015-5330 required an update to ldb 2:1.1.17-2+deb8u1 to correct
    the defects."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P");
      script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N");
      script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
      script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"false");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:samba");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:7.0");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0");
    
      script_set_attribute(attribute:"patch_publication_date", value:"2016/01/02");
      script_set_attribute(attribute:"plugin_publication_date", value:"2016/01/04");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2016-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"Debian Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("debian_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
    if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    if (deb_check(release:"7.0", prefix:"libnss-winbind", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"libpam-smbpass", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"libpam-winbind", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"libsmbclient", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"libsmbclient-dev", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"libwbclient-dev", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"libwbclient0", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"samba", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"samba-common", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"samba-common-bin", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"samba-dbg", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"samba-doc", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"samba-doc-pdf", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"samba-tools", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"smbclient", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"swat", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"7.0", prefix:"winbind", reference:"2:3.6.6-6+deb7u6")) flag++;
    if (deb_check(release:"8.0", prefix:"libnss-winbind", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"libpam-smbpass", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"libpam-winbind", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"libparse-pidl-perl", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"libsmbclient", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"libsmbclient-dev", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"libsmbsharemodes-dev", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"libsmbsharemodes0", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"libwbclient-dev", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"libwbclient0", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"python-samba", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"registry-tools", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"samba", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"samba-common", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"samba-common-bin", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"samba-dbg", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"samba-dev", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"samba-doc", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"samba-dsdb-modules", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"samba-libs", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"samba-testsuite", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"samba-vfs-modules", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"smbclient", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    if (deb_check(release:"8.0", prefix:"winbind", reference:"2:4.1.17+dfsg-2+deb8u1")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
      else security_warning(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");