![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.150720 |
Category: | General |
Title: | Samba 2.0.0 <= 3.0.9 Vulnerability (CVE-2004-1154) |
Summary: | Integer overflow could lead to remote code execution (RCE). |
Description: | Summary: Integer overflow could lead to remote code execution (RCE). Vulnerability Insight: Remote exploitation of an integer overflow vulnerability in the smbd daemon included in Samba 2.0.x, Samba 2.2.x, and Samba 3.0.x prior to and including 3.0.9 could allow an attacker to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges. Successful remote exploitation allows an attacker to gain root privileges on a vulnerable system. In order to exploit this vulnerability an attacker must possess credentials that allow access to a share on the Samba server. Unsuccessful exploitation attempts will cause the process serving the request to crash with signal 11, and may leave evidence of an attack in logs. Affected Software/OS: Samba versions 2.x and 3.0.0 through 3.0.9. Solution: Apply the patch mentioned in the linked reference. CVSS Score: 10.0 CVSS Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2004-1154 http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html BugTraq ID: 11973 http://www.securityfocus.com/bid/11973 CERT/CC vulnerability note: VU#226184 http://www.kb.cert.org/vuls/id/226184 Debian Security Information: DSA-701 (Google Search) http://www.debian.org/security/2005/dsa-701 http://www.idefense.com/application/poi/display?id=165&type=vulnerabilities https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642 http://www.redhat.com/support/errata/RHSA-2005-020.html SCO Security Bulletin: SCOSA-2005.17 ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt http://secunia.com/advisories/13453/ http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1 http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1 SuSE Security Announcement: SUSE-SA:2004:045 (Google Search) http://www.novell.com/linux/security/advisories/2004_45_samba.html XForce ISS Database: samba-msrpc-heap-corruption(18519) https://exchange.xforce.ibmcloud.com/vulnerabilities/18519 |
Copyright | Copyright (C) 2021 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |