Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.1.1.1.2010.2109
Category:Debian Local Security Checks
Title:Debian: Security Advisory (DSA-2109-1)
Summary:The remote host is missing an update for the Debian 'samba' package(s) announced via the DSA-2109-1 advisory.
Description:Summary:
The remote host is missing an update for the Debian 'samba' package(s) announced via the DSA-2109-1 advisory.

Vulnerability Insight:
A vulnerability has been discovered in samba, a SMB/CIFS file, print, and login server for Unix.

The sid_parse() function does not correctly check its input lengths when reading a binary representation of a Windows SID (Security ID). This allows a malicious client to send a sid that can overflow the stack variable that is being used to store the SID in the Samba smbd server. (CVE-2010-3069)

For the stable distribution (lenny), this problem has been fixed in version 3.2.5-4lenny13.

For the testing distribution (squeeze) and the unstable distribution (sid), this problem will be fixed in version 3.5.5~
dfsg-1.

We recommend that you upgrade your samba packages. The packages for the mips architecture are not included in this upgrade. They will be released as soon as they become available.

Affected Software/OS:
'samba' package(s) on Debian 5.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2010-3069
1024434
http://www.securitytracker.com/id?1024434
20101207 VMSA-2010-0019 VMware ESX third party updates for Service Console
http://www.securityfocus.com/archive/1/515055/100/0/threaded
41354
http://secunia.com/advisories/41354
41447
http://secunia.com/advisories/41447
42531
http://secunia.com/advisories/42531
42885
http://secunia.com/advisories/42885
43212
http://www.securityfocus.com/bid/43212
ADV-2010-2378
http://www.vupen.com/english/advisories/2010/2378
ADV-2010-3126
http://www.vupen.com/english/advisories/2010/3126
ADV-2011-0091
http://www.vupen.com/english/advisories/2011/0091
APPLE-SA-2011-03-21-1
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
APPLE-SA-2011-06-23-1
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
FEDORA-2010-14627
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.html
FEDORA-2010-14678
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.html
FEDORA-2010-14768
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.html
HPSBUX02657
http://marc.info/?l=bugtraq&m=130835366526620&w=2
RHSA-2010:0860
http://www.redhat.com/support/errata/RHSA-2010-0860.html
SSRT100460
SUSE-SR:2010:018
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
SUSE-SR:2010:019
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html
USN-987-1
http://www.ubuntu.com/usn/USN-987-1
http://support.apple.com/kb/HT4581
http://support.apple.com/kb/HT4723
http://us1.samba.org/samba/history/samba-3.5.5.html
http://us1.samba.org/samba/security/CVE-2010-3069.html
http://www.vmware.com/security/advisories/VMSA-2010-0019.html
samba-sidparse-bo(61773)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61773
CopyrightCopyright (C) 2023 Greenbone AG

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.