----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)  

If not, then implement it through the most reliable vulnerability
intelligence source on the market. 

Implement it through Secunia. 

For more information visit:
http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to
discuss how we can help you with our capabilities contact us at:
sales@secunia.com

----------------------------------------------------------------------

TITLE:
Samba Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA36585

VERIFY ADVISORY:
http://secunia.com/advisories/36585/

DESCRIPTION:
Some vulnerabilities have been reported in Samba, which can be
exploited by malicious users to compromise a vulnerable system and by
malicious people to cause a DoS (Denial of Service). 

1) An unspecified error in "smbd" can be exploited to cause a
heap-based buffer overflow.

2) An unspecified error can be exploited to cause a heap-based buffer
overflow when the application is compiled with the
"--enable-developer" option.

3) An unspecified error can be exploited to cause a heap-based buffer
overflow.

4) An unspecified error can be exploited to cause a stack-based
buffer overflow.

Successful exploitation may allow execution of arbitrary code, but
requires a valid username and password from the "admin" group.

SOLUTION:
Run Samba servers in trusted networks only.

PROVIDED AND/OR DISCOVERED BY:
Reportedly modules for VulnDisco Pack.

ORIGINAL ADVISORY:
http://intevydis.com/vd-list.shtml

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------