Displaying 20 results from an estimated 1100 matches similar to: "samba security question - samba vulnerable to any Windows Exploits?"
2004 Jun 23
2
samba security question - samba vulnerable to any WindowsExploits?
Hi Ryan,
I am not authenticating to any Windows server, I just have the samba
server itself set up with 3 users who an login.
...Paul
Ryan Frantz wrote:
>Paul,
>
>Are you using a Windows PDC or ADS to authenticate your Samba shares?
>If so, the problem would not be with Samba, but with the authenticating
>server.
>
>Ryan
>
>-----Original Message-----
>From:
2004 Jun 23
0
samba security question - samba vulnerable to anyWindowsExploits?
Paul,
Are you using Samba to authenticate then? You've created user accounts
on your Linux system that map to Windows accounts and built the Samba
password database using 'smbpasswd'?
ry
-----Original Message-----
From: samba-bounces+ryanfrantz=informed-llc.com@lists.samba.org
[mailto:samba-bounces+ryanfrantz=informed-llc.com@lists.samba.org] On
Behalf Of Paul Bradshaw
Sent:
2003 Dec 16
3
Results of nessus scan
I run samba 2.2.8a on my openbsd 3.4 box, installed from a package.
All i need is the ability to mount disks form winxp boxes so i only run
smbd, at 139/tcp.
I tried scanning the box with nessus, and it came up with some results
that got me curious.
Since i dont know very much about the smb protocol I thought i should
ask here.
Have searched the archives but found only old posts, concering
2006 Feb 09
1
Running nessus on freebsd...
I'm trying to get nessus setup for doing some internal security
checking. I installed the ports for nessus and nessus-plugins,
and everything worked as expected. I then registered for the
full feed of plugins, which got me up to over 10,000 plugins.
I restarted nessus, and it didn't work at all. I am running
without X11, so I'm doing batch runs. I already have nmap
installed, so I
2011 Feb 18
0
nessus would not compile under 8.1
hi gurus:
tried to install nessus and it would not compile:
===> Configuring for nessus-libraries-2.2.9_1
********************************************************
* W a r n i n g *
* *
* Nessus needs Berkeley Packet Filter (bpf). *
* To use nessus, your kernel must be rebuilt with bpf, *
*
2003 Dec 17
0
Install X100P and TDM400P Asterisk cards!
Hi!
I currently have the X100P and TDM400P Asterisk cards. For obtaining
Asterisk PBX: I have no direct connection to internet, so I use ftp and
download the neweast packages: zaptel-0.7.0, libpri-0.4.0,
asterisk-0.5.0.
The environment I compiled the tool:
PC (HP): Intel PIII 500 MHz
OS: Red Hat Linux 8.0 (Upgrade from Red Hat Linux 7.1).
When I compile the first package (zaptel-0.7.0), I
2009 Sep 25
0
CentOS-announce Digest, Vol 55, Issue 9
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2012 Mar 05
3
Lose XHCI Device on HP Ivybridge While Resuming on Battery
After resuming more than once on battery these HP Ivybridge laptops, the XHCI devices stop working. Have anyone seen this before? I wanted to check before diving in deeper. Let me know if you have any ideas. Thanks!
Facts
- Xen 4.0.3, Linux 3.2.7 PVOPs
- Happens on HP Ivybridge. Doesn''t happen on very similar HP Sandybridge Clash system.
- Happens on battery, but not on AC.
-
2014 Oct 04
1
LDAP NULL BASE Search Access to Samba4
Recently, i scanned my samba4.1 server by Nessus (a vulnerability scanner
tool - http://www.tenable.com/products/nessus)
Nessus says that Samba4 is vulnerable to "LDAP NULL BASE Search Access" as
"The remote LDAP server may disclose sensitive information."
Further it says that - The remote LDAP server supports search requests with
a null, or empty, base object. This allows
1999 Sep 02
0
SECURITY: RHSA-1999:033 Buffer overflow problem in the inews program
-----BEGIN PGP SIGNED MESSAGE-----
- ---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Buffer overflow problem in the inews program
Advisory ID: RHSA-1999:033-01
Issue date: 1999-09-01
Keywords: inn inews buffer overflow
- ---------------------------------------------------------------------
1. Topic:
New packages for INN
2009 Sep 26
0
CentOS-announce Digest, Vol 55, Issue 10
Send CentOS-announce mailing list submissions to
centos-announce at centos.org
To subscribe or unsubscribe via the World Wide Web, visit
http://lists.centos.org/mailman/listinfo/centos-announce
or, via email, send a message with subject or body 'help' to
centos-announce-request at centos.org
You can reach the person managing the list at
centos-announce-owner at centos.org
When
2003 Jun 26
0
What is Newt?
Newt is a separate library from asterisk that is used to easily create a ncurses based program.
If you want to see some examples of how to use newt, look under the 'zaptel' source for zttool.c and/or under the asterisk/astman source for astman.c
Newt pretty easy to code off of and can make a quick & easy frontend for things.
Check out the /usr/share/doc/<newt directory> for more
2013 Oct 31
7
[Bug 870] New: Iptables cannot block outbound packets sent by Nessus
https://bugzilla.netfilter.org/show_bug.cgi?id=870
Summary: Iptables cannot block outbound packets sent by Nessus
Product: iptables
Version: 1.4.x
Platform: x86_64
OS/Version: Ubuntu
Status: NEW
Severity: normal
Priority: P5
Component: iptables
AssignedTo: netfilter-buglog at lists.netfilter.org
2009 Sep 25
0
CESA-2009:1463 Moderate CentOS 3 x86_64 newt - security update
CentOS Errata and Security Advisory CESA-2009:1463
newt security update for CentOS 3 x86_64:
https://rhn.redhat.com/errata/RHSA-2009-1463.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
x86_64:
updates/x86_64/RPMS/newt-0.51.5-2.el3.i386.rpm
updates/x86_64/RPMS/newt-0.51.5-2.el3.x86_64.rpm
updates/x86_64/RPMS/newt-devel-0.51.5-2.el3.x86_64.rpm
source:
2009 Sep 26
0
CESA-2009:1463 Moderate CentOS 4 x86_64 newt Update
CentOS Errata and Security Advisory 2009:1463 Moderate
Upstream details at : http://rhn.redhat.com/errata/RHSA-2009-1463.html
The following updated files have been uploaded and are currently
syncing to the mirrors:
Source:
newt-0.51.6-10.el4_8.1.src.rpm
x86_64:
newt-0.51.6-10.el4_8.1.i386.rpm
newt-0.51.6-10.el4_8.1.x86_64.rpm
newt-debuginfo-0.51.6-10.el4_8.1.i386.rpm
2009 Sep 25
0
CESA-2009:1463 Moderate CentOS 3 i386 newt - security update
CentOS Errata and Security Advisory CESA-2009:1463
newt security update for CentOS 3 i386:
https://rhn.redhat.com/errata/RHSA-2009-1463.html
The following updated file has been uploaded and is currently syncing to
the mirrors:
i386:
updates/i386/RPMS/newt-0.51.5-2.el3.i386.rpm
updates/i386/RPMS/newt-devel-0.51.5-2.el3.i386.rpm
source:
updates/SRPMS/newt-0.51.5-2.el3.src.rpm
You may update
2009 Oct 30
0
CESA-2009:1463 Moderate CentOS 5 x86_64 newt Update
CentOS Errata and Security Advisory 2009:1463 Moderate
Upstream details at : https://rhn.redhat.com/errata/RHSA-2009-1463.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( md5sum Filename )
x86_64:
f8da48a1a3a5d0b687f34ea68ac2288d newt-0.52.2-12.el5_4.1.i386.rpm
77cb721db151ecf860cfc04a562cf854 newt-0.52.2-12.el5_4.1.x86_64.rpm
1999 Sep 04
0
buffer overflow in proftpd-1.2.0pre4, supposed to be ''safe''
This message is in MIME format. The first part should be readable text,
while the remaining parts are likely unreadable without MIME-aware tools.
Send mail to mime@docserver.cac.washington.edu for more info.
---1463810815-1223308169-936489982=:15281
Content-Type: TEXT/PLAIN; CHARSET=US-ASCII
Content-ID: <Pine.LNX.4.10.9909050208003.15329@prof.fr.nessus.org>
Hello,
ProFTPd, a FTP
2005 Aug 16
1
Nessus Installation Failure
I'm trying to get get nessus 2.2.5 to install on my centos 3.5 system.
It errors out with this error:
Press ENTER to continue
x - Compiling the libraries
x -- Configuring the sources for your system
configure: error: Could not find OpenSSL and OpenSSL headers on your system
**** An error occured :/
Do you want to save the compilation log to analyze what went wrong ? [y]
Where should I save
2005 Mar 12
4
Shorewall 2.2.1 and open ports
Hello all,
I’m running Shorewall 2.2.1 on linux kernel 2.6.10 with iptables 1.2.11. I recently ran a nessus scan of my firewall from a machine outside of the firewall and the nessus report told me that there are some ports open that I did not specify to be open. The ports are 32772/udp, 123/udp, 111/tcp, 32772/udp, and 53/udp. Why are these ports open when I did NOT specify them to be open