📄 samba_cb-a08-0085.nasl
字号:
## This script was written by Carsten Koch-Mauthe <c.koch-mauthe at dn-systems.de>## This script is released under the GNU GPLv2## $Revision: 01 $if(description){ script_id(90028); script_version ("$Revision: 01 $"); script_cve_id("CVE-2008-1105"); name["english"] = "Samba 3.0.0 > 3.0.29 vulnerability"; script_name(english:name["english"]); desc["english"] = "The remote host is probably affected by the vulnerabilities described inCVE-2008-1105Samba < 3.0.29 vulnerabilityImpact CVE-2008-1105 Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response. References: http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105Solution: All Samba users should upgrade to the latest version:Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Determines Samba < 3.0.29 vulnerability"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is under GPLv2"); family["english"] = "Local test SuSE/FC/Gent./Ubuntu"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); exit(0);}## The code starts here#include("version_func.inc");include("revisions-lib.inc");include("pkg-lib-deb.inc");sec_proto = "Samba";# Checking SuSE/Fedora kbrls = get_kb_item("ssh/login/release"); rls = NULL; ver = NULL; rel = NULL; pkg = NULL; rls[0] = "SUSE10.1"; ver[0] = "3.0.28"; rel[0] = "0.4.3"; pkg[0] = "samba"; rls[1] = "SUSE10.2"; ver[1] = "3.0.23d"; rel[1] = "19.14"; pkg[1] = "samba"; rls[2] = "SUSE10.3"; ver[2] = "3.0.26a"; rel[2] = "3.7"; pkg[2] = "samba"; rls[3] = "FC7"; ver[3] = "3.0.28a"; rel[3] = "1.fc7"; pkg[3] = "samba"; rls[4] = "FC8"; ver[4] = "3.0.30"; rel[4] = "0.fc8"; pkg[4] = "samba"; rls[5] = "FC9"; ver[5] = "3.2.0"; rel[5] = "1.rc1.14.fc9"; pkg[5] = "samba"; foreach i (keys(rls)) { if( kbrls == rls[i] ) { rpms = get_kb_item("ssh/login/rpms"); if( rpms ) { pat = ";"+pkg[i]+"~([0-9\.\-]+)"; version = get_string_version(text:rpms, ver_pattern:pat); if(!isnull(version)) { if( version_is_less(version:version[1], test_version:ver[i]) ) { security_hole(port:0, proto:sec_proto); } else { if( version_is_equal(version:version[1], test_version:ver[i]) ) { pat = version[0]+"~([0-9\.\-]+)"; release = get_string_version(text:rpms, ver_pattern:pat); if(!isnull(release)) { if( version_is_less(version:release[1] ,test_version:rel[i]) ) { security_hole(port:0, proto:sec_proto); } } } } } } } }# Checking Gentoo rls = NULL; ver = NULL; rel = NULL; pkg = NULL; rls[0] = "GENTOO"; pat = "net-fs/samba-([a-zA-Z0-9\.\-]+)"; ver[0] = "3.0.28a-r1"; if( kbrls == rls[0] ) { pkg = get_kb_item("ssh/login/pkg"); if(pkg) { version = get_string_version(text:pkg, ver_pattern:pat); if(!isnull(version)) { if( revcomp(a:version[1], b: ver[0]) == -1 ) { security_hole(port:0, proto:sec_proto); } } } }# Checking Ubuntu rls = NULL; ver = NULL; rel = NULL; pkg = NULL; rls[0] = "UBUNTU6.06 LTS"; ver[0] = "3.0.22-1ubuntu3.7"; pkg[0] = "samba"; rls[1] = "UBUNTU7.04"; ver[1] = "3.0.24-2ubuntu1.6"; pkg[1] = "samba"; rls[2] = "UBUNTU7.10"; ver[2] = "3.0.26a-1ubuntu2.4"; pkg[2] = "samba"; rls[3] = "UBUNTU8.04"; ver[3] = "3.0.28a-1ubuntu4.2"; pkg[3] = "samba"; foreach i (keys(rls)) { if( kbrls == rls[i] ) { if(isdpkgvuln(pkg:pkg[i], ver:ver[i], rls:rls[i])) { security_hole(port:0, proto:sec_proto); } } }exit(0);
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -