Lucene search

K
nessusThis script is Copyright (C) 2004-2021 Tenable Network Security, Inc.DEBIAN_DSA-600.NASL
HistoryNov 10, 2004 - 12:00 a.m.

Debian DSA-600-1 : samba - arbitrary file access

2004-11-1000:00:00
This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.
www.tenable.com
9

A vulnerability has been discovered in samba, a commonly used LanManager-like file and printer server for Unix. A remote attacker may be able to gain access to files which exist outside of the share’s defined path. Such files must still be readable by the account used for the connection, though.

#%NASL_MIN_LEVEL 70300

#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were  
# extracted from Debian Security Advisory DSA-600. The text 
# itself is copyright (C) Software in the Public Interest, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(15690);
  script_version("1.17");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");

  script_cve_id("CVE-2004-0815");
  script_xref(name:"DSA", value:"600");

  script_name(english:"Debian DSA-600-1 : samba - arbitrary file access");
  script_summary(english:"Checks dpkg output for the updated package");

  script_set_attribute(
    attribute:"synopsis", 
    value:"The remote Debian host is missing a security-related update."
  );
  script_set_attribute(
    attribute:"description", 
    value:
"A vulnerability has been discovered in samba, a commonly used
LanManager-like file and printer server for Unix. A remote attacker
may be able to gain access to files which exist outside of the share's
defined path. Such files must still be readable by the account used
for the connection, though."
  );
  script_set_attribute(
    attribute:"see_also",
    value:"http://www.debian.org/security/2004/dsa-600"
  );
  script_set_attribute(
    attribute:"solution", 
    value:
"Upgrade the samba packages.

For the stable distribution (woody) this problem has been fixed in
version 2.2.3a-14.1.

In the unstable (sid) and testing (sarge) distributions this problem
was not present."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:samba");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:3.0");

  script_set_attribute(attribute:"patch_publication_date", value:"2004/10/07");
  script_set_attribute(attribute:"plugin_publication_date", value:"2004/11/10");
  script_set_attribute(attribute:"vuln_publication_date", value:"2004/09/30");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.");
  script_family(english:"Debian Local Security Checks");

  script_dependencies("ssh_get_info.nasl");
  script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");

  exit(0);
}


include("audit.inc");
include("debian_package.inc");


if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);


flag = 0;
if (deb_check(release:"3.0", prefix:"libpam-smbpass", reference:"2.2.3a-14.1")) flag++;
if (deb_check(release:"3.0", prefix:"libsmbclient", reference:"2.2.3a-14.1")) flag++;
if (deb_check(release:"3.0", prefix:"libsmbclient-dev", reference:"2.2.3a-14.1")) flag++;
if (deb_check(release:"3.0", prefix:"samba", reference:"2.2.3a-14.1")) flag++;
if (deb_check(release:"3.0", prefix:"samba-common", reference:"2.2.3a-14.1")) flag++;
if (deb_check(release:"3.0", prefix:"samba-doc", reference:"2.2.3a-14.1")) flag++;
if (deb_check(release:"3.0", prefix:"smbclient", reference:"2.2.3a-14.1")) flag++;
if (deb_check(release:"3.0", prefix:"smbfs", reference:"2.2.3a-14.1")) flag++;
if (deb_check(release:"3.0", prefix:"swat", reference:"2.2.3a-14.1")) flag++;
if (deb_check(release:"3.0", prefix:"winbind", reference:"2.2.3a-14.1")) flag++;

if (flag)
{
  if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
  else security_hole(0);
  exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
VendorProductVersionCPE
debiandebian_linuxsambap-cpe:/a:debian:debian_linux:samba
debiandebian_linux3.0cpe:/o:debian:debian_linux:3.0