9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.96 High
EPSS
Percentile
99.5%
CentOS Errata and Security Advisory CESA-2007:1013-01
Samba is a suite of programs used by machines to share files, printers, and
other information.
A buffer overflow flaw was found in the way Samba creates NetBIOS replies.
If a Samba server is configured to run as a WINS server, a remote
unauthenticated user could cause the Samba server to crash or execute
arbitrary code. (CVE-2007-5398)
A heap-based buffer overflow flaw was found in the way Samba authenticates
users. A remote unauthenticated user could trigger this flaw to cause the
Samba server to crash. Careful analysis of this flaw has determined that
arbitrary code execution is not possible, and under most circumstances will
not result in a crash of the Samba server. (CVE-2007-4572)
Red Hat would like to thank Alin Rad Pop of Secunia Research, and the Samba
developers for responsibly disclosing these issues.
Users of Samba are advised to ugprade to these updated packages, which
contain backported patches to resolve these issues.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2007-November/076603.html
Affected packages:
samba
samba-client
samba-common
samba-swat
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 2 | i386 | samba | < 2.2.12-1.21as.8.1 | samba-2.2.12-1.21as.8.1.i386.rpm |
CentOS | 2 | i386 | samba-client | < 2.2.12-1.21as.8.1 | samba-client-2.2.12-1.21as.8.1.i386.rpm |
CentOS | 2 | i386 | samba-common | < 2.2.12-1.21as.8.1 | samba-common-2.2.12-1.21as.8.1.i386.rpm |
CentOS | 2 | i386 | samba-swat | < 2.2.12-1.21as.8.1 | samba-swat-2.2.12-1.21as.8.1.i386.rpm |