[PLDSA 51-1] New samba packages fix remote root exploit
Krzysiek Taraszka
dzimi at pld.org.pl
Sat May 3 15:46:05 CEST 2003
- --------------------------------------------------------------------------
PLD Security Advisory PLDSA 51-1 security at pld.org.pl
http://www.pld.org.pl/security/ PLD Security Team
08 April 2003 http://www.pld.org.pl/security/faq
- --------------------------------------------------------------------------
Package : prior to samba-2.2.7-1
Vulnerability : buffer overflow
Problem-Type : remote
PLD-specific : no
CVE references : CAN-2003-0201, CAN-2003-0196
Samba is an Open Source/Free Software suite that provides seamless file and
print services to SMB/CIFS clients.
An anonymous user can gain remote root access due to a buffer overflow caused
by a StrnCpy() into a char array (fname) using a non-constant length
(namelen).
The above problems have been fixed in version 2.2.8a-1 for the
current stable distribution (ra).
We recommend that you upgrade your samba packages.
wget -c url
will fetch the file for you
rpm -Uhv file(s)*.rpm
will upgrade the referenced file.
If you are using "poldek" - the package manager, use the line as given below
for upgrade packages
poldek --update
will update the internal database
poldek --upgrade 'samba*'
will install corrected packages
If you are using "apt" - the package manager, use the line as given below
for upgrade packages
apt-get update
will update the internal database
apt-get upgrade 'samba*'
will install corrected packages
PLD Linux 1.0 alias ra
- --------------------
Source archives:
ftp://ftp.pld.org.pl/dists/ra/updates/security/SRPMS/samba-2.2.8a-1.src.rpm
MD5 checksum: 45b933cf309ba9cd53f7d19a634532e0
I386 Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/swat-2.2.8a-1.i386.rpm
MD5 checksum: 40a1221018eccd325a58be1c0be693d3
ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/samba-2.2.8a-1.i386.rpm
MD5 checksum: 0d29ecd82d304be1e16619b62808553b
ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/samba-client-2.2.8a-1.i386.rpm
MD5 checksum: 3bac8102bd1d44db2d6ecbb3605b6021
ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/samba-common-2.2.8a-1.i386.rpm
MD5 checksum: b704e6f923e49af840e29c9d86f3a049
ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/cups-backend-smb-2.2.8a-1.i386.rpm
MD5 checksum: b99d883b219b794ffa370e6367576b41
ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/libsmbclient-2.2.8a-1.i386.rpm
MD5 checksum: bcdf881c487f6025a85ea99d7cb0885d
ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/libsmbclient-devel-2.2.8a-1.i386.rpm
MD5 checksum: 343f9e3dc99b26b01ffad057337ec9fd
ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/pam-pam_smbpass-2.2.8a-1.i386.rpm
MD5 checksum: ac41b71c1317ffb3ba5d2fb6bd13bfd1
I586 Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/swat-2.2.8a-1.i586.rpm
MD5 checksum: 8dedc3aefe3edb6c8c1e26bc227b8d65
ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/samba-2.2.8a-1.i586.rpm
MD5 checksum: 86eea82d0451a03d2281c19bdfcd0827
ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/samba-client-2.2.8a-1.i586.rpm
MD5 checksum: 85f0c7a20516c6245a7dd178d4d914c3
ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/samba-common-2.2.8a-1.i586.rpm
MD5 checksum: 36564eee7fed49102457fcc8dc2e3416
ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/cups-backend-smb-2.2.8a-1.i586.rpm
MD5 checksum: 914cc9ab7a74a86745c9b80478a41760
ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/libsmbclient-2.2.8a-1.i586.rpm
MD5 checksum: 6e81abf8bc0ab18c399f1372aefa23e9
ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/libsmbclient-devel-2.2.8a-1.i586.rpm
MD5 checksum: 1ef534b8f1c60235176158d237fbda9f
ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/pam-pam_smbpass-2.2.8a-1.i586.rpm
MD5 checksum: e63f2b0e7c6cd86c597c4fb34d221638
I686 Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/swat-2.2.8a-1.i686.rpm
MD5 checksum: 47da6a9230066f66fa17905c9500e865
ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/samba-2.2.8a-1.i686.rpm
MD5 checksum: d11ef730160a03ef8fc1e548eecde484
ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/samba-client-2.2.8a-1.i686.rpm
MD5 checksum: 0dfa260c170c2fd88f2a1afee50aa636
ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/samba-common-2.2.8a-1.i686.rpm
MD5 checksum: 57f425d4ab67937ff576974bcd38b2f6
ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/cups-backend-smb-2.2.8a-1.i686.rpm
MD5 checksum: 2a913f09cceb24e8cdf3c557c903e75f
ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/libsmbclient-2.2.8a-1.i686.rpm
MD5 checksum: 48a073691896c22b51b0aa39fe76a988
ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/libsmbclient-devel-2.2.8a-1.i686.rpm
MD5 checksum: b70d22766f8ea95b336d07a1d7ea62ec
ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/pam-pam_smbpass-2.2.8a-1.i686.rpm
MD5 checksum: bf911ff90e5d5726bf0b92e8d85daedc
PowerPC Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/swat-2.2.8a-1.ppc.rpm
MD5 checksum: e1f191b0c8deb0fe536663a72251383d
ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/samba-2.2.8a-1.ppc.rpm
MD5 checksum: fd0ce5df079cef0fb7fe95be002ab60d
ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/samba-client-2.2.8a-1.ppc.rpm
MD5 checksum: 9bd92a23e77a311cf5817503fb05c7b1
ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/samba-common-2.2.8a-1.ppc.rpm
MD5 checksum: 1c4baa6117fd7f793c3ff6331dd6857d
ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/cups-backend-smb-2.2.8a-1.ppc.rpm
MD5 checksum: 066bddee2b0a13b45805d69af9267215
ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/libsmbclient-2.2.8a-1.ppc.rpm
MD5 checksum: 00465c5e90a8cd87f8d41680edee6942
ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/libsmbclient-devel-2.2.8a-1.ppc.rpm
MD5 checksum: 5487762457779ca0a945a83ee62ac00c
ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/pam-pam_smbpass-2.2.8a-1.ppc.rpm
MD5 checksum: 4c6f44cddb922dbcfcb3d65bef6a5357
-
--------------------------------------------------------------------------------
-
If you are using poldek add this line to poldek.conf.
If you are using apt-get add this line to sources.list.
For i386 architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/i386 base updates-security
For i586 architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/i586 base updates-security
For i686 architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/i686 base updates-security
For ppc architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/ppc base updates-security
More information about the pld-security-announce
mailing list