Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2010:141 | First vendor Publication | 2010-07-27 |
Vendor | Mandriva | Last vendor Modification | 2010-07-27 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Multiple vulnerabilities has been discovered and corrected in samba: The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value (CVE-2010-1635). The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request (CVE-2010-1642). The updated packages provides samba 3.4.8 which is not vulnerable to these issues. |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2010:141 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-22 (Samba) File : nvt/glsa_201206_22.nasl |
2010-07-30 | Name : Mandriva Update for samba MDVSA-2010:141 (samba) File : nvt/gb_mandriva_MDVSA_2010_141.nasl |
2010-05-19 | Name : Samba Multiple Remote Denial of Service Vulnerabilities File : nvt/gb_samba_40097.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
65436 | Samba smbd sesssetup.c Session Setup AndX Security Blob Length Value Uninitia... |
65435 | Samba smbd process.c chain_reply Function Session Setup AndX Request NULL Der... |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Samba smbd flags2 header parsing denial of service attempt RuleID : 17152 - Revision : 10 - Type : SERVER-SAMBA |
2014-01-10 | Samba smbd Session Setup AndX security blob length dos attempt RuleID : 16684 - Revision : 13 - Type : SERVER-SAMBA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2012-06-25 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201206-22.nasl - Type : ACT_GATHER_INFO |
2010-07-30 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-141.nasl - Type : ACT_GATHER_INFO |
2010-05-17 | Name : The remote service is vulnerable to denial of service attacks. File : samba_3_5_2.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:41:36 |
|