[PLDSA 51-1] New samba packages fix remote root exploit

Krzysiek Taraszka dzimi at pld.org.pl
Sat May 3 15:46:05 CEST 2003


- --------------------------------------------------------------------------
PLD Security Advisory PLDSA 51-1                       security at pld.org.pl
http://www.pld.org.pl/security/                          PLD Security Team
08 April 2003				http://www.pld.org.pl/security/faq
- --------------------------------------------------------------------------

Package        : prior to samba-2.2.7-1
Vulnerability  : buffer overflow
Problem-Type   : remote
PLD-specific   : no
CVE references : CAN-2003-0201, CAN-2003-0196 

Samba is an Open Source/Free Software suite that provides seamless file and
print services to SMB/CIFS clients.
An anonymous user can gain remote root access due to a buffer overflow caused
by a StrnCpy() into a char array (fname) using a non-constant length
(namelen).

The above problems have been fixed in version 2.2.8a-1 for the
current stable distribution (ra).

We recommend that you upgrade your samba packages.

wget -c url
	will fetch the file for you
rpm -Uhv file(s)*.rpm
        will upgrade the referenced file.

If you are using "poldek" - the package manager, use the line as given below
for upgrade packages

poldek --update
        will update the internal database
poldek --upgrade 'samba*'
        will install corrected packages

If you are using "apt" - the package manager, use the line as given below
for upgrade packages

apt-get update
        will update the internal database
apt-get upgrade 'samba*'
        will install corrected packages

PLD Linux 1.0 alias ra
- --------------------

  Source archives:

ftp://ftp.pld.org.pl/dists/ra/updates/security/SRPMS/samba-2.2.8a-1.src.rpm
       MD5 checksum: 45b933cf309ba9cd53f7d19a634532e0

  I386 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/swat-2.2.8a-1.i386.rpm
       MD5 checksum: 40a1221018eccd325a58be1c0be693d3

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/samba-2.2.8a-1.i386.rpm
       MD5 checksum: 0d29ecd82d304be1e16619b62808553b

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/samba-client-2.2.8a-1.i386.rpm
       MD5 checksum: 3bac8102bd1d44db2d6ecbb3605b6021

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/samba-common-2.2.8a-1.i386.rpm
       MD5 checksum: b704e6f923e49af840e29c9d86f3a049

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/cups-backend-smb-2.2.8a-1.i386.rpm
       MD5 checksum: b99d883b219b794ffa370e6367576b41

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/libsmbclient-2.2.8a-1.i386.rpm
       MD5 checksum: bcdf881c487f6025a85ea99d7cb0885d

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/libsmbclient-devel-2.2.8a-1.i386.rpm
       MD5 checksum: 343f9e3dc99b26b01ffad057337ec9fd

ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/pam-pam_smbpass-2.2.8a-1.i386.rpm
       MD5 checksum: ac41b71c1317ffb3ba5d2fb6bd13bfd1


  I586 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/swat-2.2.8a-1.i586.rpm
       MD5 checksum: 8dedc3aefe3edb6c8c1e26bc227b8d65

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/samba-2.2.8a-1.i586.rpm
       MD5 checksum: 86eea82d0451a03d2281c19bdfcd0827

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/samba-client-2.2.8a-1.i586.rpm
       MD5 checksum: 85f0c7a20516c6245a7dd178d4d914c3

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/samba-common-2.2.8a-1.i586.rpm
       MD5 checksum: 36564eee7fed49102457fcc8dc2e3416

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/cups-backend-smb-2.2.8a-1.i586.rpm
       MD5 checksum: 914cc9ab7a74a86745c9b80478a41760

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/libsmbclient-2.2.8a-1.i586.rpm
       MD5 checksum: 6e81abf8bc0ab18c399f1372aefa23e9

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/libsmbclient-devel-2.2.8a-1.i586.rpm
       MD5 checksum: 1ef534b8f1c60235176158d237fbda9f

ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/pam-pam_smbpass-2.2.8a-1.i586.rpm
       MD5 checksum: e63f2b0e7c6cd86c597c4fb34d221638


  I686 Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/swat-2.2.8a-1.i686.rpm
       MD5 checksum: 47da6a9230066f66fa17905c9500e865

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/samba-2.2.8a-1.i686.rpm
       MD5 checksum: d11ef730160a03ef8fc1e548eecde484

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/samba-client-2.2.8a-1.i686.rpm
       MD5 checksum: 0dfa260c170c2fd88f2a1afee50aa636

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/samba-common-2.2.8a-1.i686.rpm
       MD5 checksum: 57f425d4ab67937ff576974bcd38b2f6

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/cups-backend-smb-2.2.8a-1.i686.rpm
       MD5 checksum: 2a913f09cceb24e8cdf3c557c903e75f

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/libsmbclient-2.2.8a-1.i686.rpm
       MD5 checksum: 48a073691896c22b51b0aa39fe76a988

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/libsmbclient-devel-2.2.8a-1.i686.rpm
       MD5 checksum: b70d22766f8ea95b336d07a1d7ea62ec

ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/pam-pam_smbpass-2.2.8a-1.i686.rpm
       MD5 checksum: bf911ff90e5d5726bf0b92e8d85daedc


  PowerPC Architecture components:

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/swat-2.2.8a-1.ppc.rpm
       MD5 checksum: e1f191b0c8deb0fe536663a72251383d

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/samba-2.2.8a-1.ppc.rpm
       MD5 checksum: fd0ce5df079cef0fb7fe95be002ab60d

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/samba-client-2.2.8a-1.ppc.rpm
       MD5 checksum: 9bd92a23e77a311cf5817503fb05c7b1

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/samba-common-2.2.8a-1.ppc.rpm
       MD5 checksum: 1c4baa6117fd7f793c3ff6331dd6857d

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/cups-backend-smb-2.2.8a-1.ppc.rpm
       MD5 checksum: 066bddee2b0a13b45805d69af9267215

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/libsmbclient-2.2.8a-1.ppc.rpm
       MD5 checksum: 00465c5e90a8cd87f8d41680edee6942

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/libsmbclient-devel-2.2.8a-1.ppc.rpm
       MD5 checksum: 5487762457779ca0a945a83ee62ac00c

ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/pam-pam_smbpass-2.2.8a-1.ppc.rpm
       MD5 checksum: 4c6f44cddb922dbcfcb3d65bef6a5357


-
--------------------------------------------------------------------------------
-
If you are using poldek add this line to poldek.conf.
If you are using apt-get add this line to sources.list.

For i386 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i386 base updates-security
For i586 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i586 base updates-security
For i686 architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/i686 base updates-security
For ppc architecture
poldek:         source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/
apt-get:        rpm ftp://ftp.pld.org.pl/dists ra/apt/ppc base updates-security



More information about the pld-security-announce mailing list