The remote host is missing an update to samba announced via advisory DSA 065-1. Michal Zalewski discovered that samba does not properly validate NetBIOS names from remote machines. The Debian GNU/Linux packaged version of samba has a safe configuration and is not vulnerable. As a temporary workaround for systems that are vulnerable, change all occurrences of the `%m' macro in smb.conf to `%l' and restart samba. This has been fixed in version 2.0.7-3.4, and we recommend that you upgrade your samba package immediately
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
![]() | Debian DSA-065-1 : samba - remote file append/creation | 29 Sep 200400:00 | – | nessus |
![]() | Samba NETBIOS Name Traversal Arbitrary Remote File Creation | 17 Oct 200100:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : samba (MDKSA-2001:062) | 31 Jul 200400:00 | – | nessus |
![]() | Debian Security Advisory DSA 065-1 (samba) | 17 Jan 200800:00 | – | openvas |
![]() | CVE-2001-1162 | 25 Jun 200204:00 | – | cve |
![]() | CVE-2001-1162 | 23 Jun 200104:00 | – | nvd |
![]() | CVE-2001-1162 | 25 Jun 200204:00 | – | cvelist |
# OpenVAS Vulnerability Test
# $Id: deb_065_1.nasl 6616 2017-07-07 12:10:49Z cfischer $
# Description: Auto-generated from advisory DSA 065-1
#
# Authors:
# Thomas Reinke <[email protected]>
#
# Copyright:
# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com
# Text descriptions are largerly excerpted from the referenced
# advisory, and are Copyright (c) the respective author(s)
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License version 2,
# as published by the Free Software Foundation
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
#
include("revisions-lib.inc");
tag_insight = "Michal Zalewski discovered that samba does not properly validate
NetBIOS names from remote machines.
By itself that is not a problem, except if Samba is configure to
write log-files to a file that includes the NetBIOS name of the
remote side by using the `%m' macro in the `log file' command. In
that case an attacker could use a NetBIOS name like '../tmp/evil'.
If the log-file was set to '/var/log/samba/%s' samba would them
write to /var/tmp/evil.
Since the NetBIOS name is limited to 15 characters and the `log
file' command could have an extension to the filename the results
of this are limited. However if the attacker is also able to create
symbolic links on the samba server he could trick samba into
appending any data he wants to all files on the filesystem which
samba can write to.
The Debian GNU/Linux packaged version of samba has a safe
configuration and is not vulnerable.
As temporary workaround for systems that are vulnerable change all
occurrences of the `%m' macro in smb.conf to `%l' and restart samba.
This has been fixed in version 2.0.7-3.4, and we recommend that up
upgrade your samba package immediately.";
tag_summary = "The remote host is missing an update to samba
announced via advisory DSA 065-1.";
tag_solution = "https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20065-1";
if(description)
{
script_id(53817);
script_cve_id("CVE-2001-1162");
script_version("$Revision: 6616 $");
script_tag(name:"last_modification", value:"$Date: 2017-07-07 14:10:49 +0200 (Fri, 07 Jul 2017) $");
script_tag(name:"creation_date", value:"2008-01-17 14:24:38 +0100 (Thu, 17 Jan 2008)");
script_tag(name:"cvss_base", value:"10.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_name("Debian Security Advisory DSA 065-1 (samba)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com");
script_family("Debian Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/debian_linux", "ssh/login/packages");
script_tag(name : "solution" , value : tag_solution);
script_tag(name : "insight" , value : tag_insight);
script_tag(name : "summary" , value : tag_summary);
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
exit(0);
}
#
# The script code starts here
#
include("pkg-lib-deb.inc");
res = "";
report = "";
if ((res = isdpkgvuln(pkg:"samba-doc", ver:"2.0.7-3.4", rls:"DEB2.2")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"samba-common", ver:"2.0.7-3.4", rls:"DEB2.2")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"samba", ver:"2.0.7-3.4", rls:"DEB2.2")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"smbclient", ver:"2.0.7-3.4", rls:"DEB2.2")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"smbfs", ver:"2.0.7-3.4", rls:"DEB2.2")) != NULL) {
report += res;
}
if ((res = isdpkgvuln(pkg:"swat", ver:"2.0.7-3.4", rls:"DEB2.2")) != NULL) {
report += res;
}
if (report != "") {
security_message(data:report);
} else if (__pkg_match) {
exit(99); # Not vulnerable.
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo