Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.880865 |
Kategorie: | CentOS Local Security Checks |
Titel: | CentOS Update for samba CESA-2009:1528 centos3 i386 |
Zusammenfassung: | The remote host is missing an update for the 'samba'; package(s) announced via the referenced advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'samba' package(s) announced via the referenced advisory. Vulnerability Insight: Samba is a suite of programs used by machines to share files, printers, and other information. A denial of service flaw was found in the Samba smbd daemon. An authenticated, remote user could send a specially-crafted response that would cause an smbd child process to enter an infinite loop. An authenticated, remote user could use this flaw to exhaust system resources by opening multiple CIFS sessions. (CVE-2009-2906) This update also fixes the following bug: * the RHSA-2007:0354 update added code to escape input passed to scripts that are run by Samba. This code was missing 'c' from the list of valid characters, causing it to be escaped. With this update, the previous patch has been updated to include 'c' in the list of valid characters. (BZ#242754) Users of Samba should upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the smb service will be restarted automatically. Affected Software/OS: samba on CentOS 3 Solution: Please install the updated packages. CVSS Score: 4.0 CVSS Vector: AV:N/AC:L/Au:S/C:N/I:N/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2009-2906 http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html BugTraq ID: 36573 http://www.securityfocus.com/bid/36573 Bugtraq: 20091112 rPSA-2009-0145-1 samba samba-client samba-server samba-swat (Google Search) http://www.securityfocus.com/archive/1/507856/100/0/threaded https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html http://osvdb.org/58519 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7090 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944 http://www.securitytracker.com/id?1022976 http://secunia.com/advisories/36893 http://secunia.com/advisories/36918 http://secunia.com/advisories/36937 http://secunia.com/advisories/36953 http://secunia.com/advisories/37428 http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439 http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1 SuSE Security Announcement: SUSE-SR:2009:017 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html http://www.ubuntu.com/usn/USN-839-1 http://www.vupen.com/english/advisories/2009/2810 XForce ISS Database: samba-smb-dos(53575) https://exchange.xforce.ibmcloud.com/vulnerabilities/53575 |
Copyright | Copyright (c) 2011 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |