[Samba] Vulnerabilities reported by Qualys scan
Xu, Ying (Houston)
Ying.Xu at littonloan.com
Thu May 28 13:52:07 GMT 2009
Thanks for the reply. I have googled and tried different solutions
before posting here. I thought that someone may encounter the same
audit issues. I tried the workaround mentioned in the link, but it
didnt work. Samba needs an existing unix account.
Ying
________________________________
From: Frank Gruman [mailto:fgatwork at verizon.net]
Sent: Wednesday, May 27, 2009 10:27 PM
To: Xu, Ying (Houston)
Cc: samba at lists.samba.org
Subject: RE: [Samba] Vulnerabilities reported by Qualys scan
On Wed, 2009-05-27 at 10:41 -0500, Xu, Ying (Houston) wrote:
Did anyone encounter this kind of audit issue at all?
Thanks
Ying
-----Original Message-----
From: samba-bounces+ying.xu=littonloan.com at lists.samba.org
[mailto:samba-bounces+ying.xu=littonloan.com at lists.samba.org] On
Behalf
Of Xu, Ying (Houston)
Sent: Friday, May 22, 2009 11:01 AM
To: samba at lists.samba.org
Subject: [Samba] Vulnerabilities reported by Qualys scan
We are running samba services on several solaris10 servers for
the users
that need to read reports/logs on their windows workstation.
THe shares
are shared read-only and allowed guest account since most of
users do
not have unix accounts. Our company recently started Qualys
scan on all
servers, and we need to address the vulnerabilities reported.
We are
getting the following vulnerabilities regarding the samba
services:
Remote User List Disclosure Using NetBIOS (CVE-2000-1200)
Null Session/Password NetBIOS Access (CVE-1999-0519)
Is there anyway to address this besides disable guest account?
Thanks
Ying Xu <yxu at littonloan.com>
Unix Group
I used to run into security scans and mitigation requirements all the
time. From a variety of scan tools...
A _VERY_ brief Google search (CVE-2000-1200 samba) lead me to
http://www.rapid7.com/vulndb/lookup/cifs-nt-0002 where you can find
instructions on mitigating that issue (there are Windows sections, a
Samba section, and a Novell section - just scroll). The second issue
was also found with a similar search and results -
http://www.rapid7.com/vulndb/lookup/cifs-nt-0001.
I have typically found that these scan tools will give you a general
idea of how to mitigate these issues (perhaps Windows-centric in this
case) but still a hint none the less. Even Qualys gives you that much.
Regards,
Frank
-------------------------------------------------------------------------------------------
DISCLAIMER: This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they are
addressed. If you have received this email in error please notify the sender
by replying to this message and then delete it from your system. Use,
dissemination or copying of this message by unintended recipients is not
authorized and may be unlawful. Please note that any views or opinions
presented in this email are solely those of the author and do not necessarily
represent those of the company. Finally, the recipient should check this email
and any attachments for the presence of viruses. The company accepts no
liability for any damage caused by any virus transmitted by this email.
More information about the samba
mailing list