Summary
The remote host is missing an update to samba
announced via advisory DSA 262-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20262-1
Insight
Sebastian Krahmer of the SuSE security audit team found two problems in samba, a popular SMB/CIFS implementation. The problems are:
* a buffer overflow in the SMB/CIFS packet fragment re-assembly code used by smbd. Since smbd runs as root an attacker can use this to gain root access to a machine running smbd.
* the code to write reg files was vulnerable for a chown race which made it possible for a local user to overwrite system files
Both problems have been fixed in upstream version 2.2.8, and version 2.2.3a-12.1 of package for Debian GNU/Linux 3.0/woody.
Severity
Classification
-
CVE CVE-2003-0085, CVE-2003-0086 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities