Users login

Create an account »

JOIN XATRIX

Users login

Home » Hacking News » Trustix #2003-0019: samba buffer overflow

Trustix #2003-0019: samba buffer overflow

by Nikola Strahija on April 9th, 2003 A vulnerability has been found in Samba that can lead to buffer overflow and allow remote attackers to gain root privileges.


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2003-0019

Package name: samba
Summary: Remote root exploit
Date: 2003-04-07
Affected versions: TSL 1.2, 1.5

- --------------------------------------------------------------------------
Package description:
Samba provides an SMB server which can be used to provide network
services to SMB (sometimes called "Lan Manager") clients, including
various versions of MS Windows, OS/2, and other Linux machines. Samba
uses NetBIOS over TCP/IP (NetBT) protocols and does NOT need NetBEUI
(Microsoft Raw NetBIOS frame) protocol.

Problem description:
A buffer overflow has been discovered in Samba affecting all versions
prior to 2.2.8a allowing for a remote root compromise. An exploit
has been released to the wild. This release patches our 2.2.8 package
up to 2.2.8a.

Action:
We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.


Location:
All TSL updates are available from
http://www.trustix.net/pub/Trustix/updates/
ftp://ftp.trustix.net/pub/Trustix/updates/


About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.


Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.

Get SWUP from:
ftp://ftp.trustix.net/pub/Trustix/software/swup/


Public testing:
These packages have been available for public testing for some time.
If you want to contribute by testing the various packages in the
testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at
http://www.trustix.net/pub/Trustix/testing/
ftp://ftp.trustix.net/pub/Trustix/testing/


Questions?
Check out our mailing lists:
http://www.trustix.net/support/


Verification:
This advisory along with all TSL packages are signed with the TSL sign key.
This key is available from:
http://www.trustix.net/TSL-GPG-KEY

The advisory itself is available from the errata pages at
http://www.trustix.net/errata/trustix-1.2/ and
http://www.trustix.net/errata/trustix-1.5/
or directly at
http://www.trustix.net/errata/misc/2003/TSL-2003-0019-samba.asc.txt>


MD5sums of the packages:
- --------------------------------------------------------------------------
70a3e32471a42ce18f34213e1a9ef915 ./1.2/RPMS/samba-2.2.8-3tr.i586.rpm
98ea77c8f443e601cea3ac951fbd94d3 ./1.2/RPMS/samba-client-2.2.8-3tr.i586.rpm
ec368177237dcdd3cb7295d849c93842 ./1.2/RPMS/samba-common-2.2.8-3tr.i586.rpm
b6b7ace9c530cdc058dddc04328502b1 ./1.2/SRPMS/samba-2.2.8-3tr.src.rpm
de491c36d57f5009e21954e81627fbc0 ./1.5/RPMS/samba-2.2.8-3tr.i586.rpm
21ec051f00d60ff915605d8140e41f3f ./1.5/RPMS/samba-client-2.2.8-3tr.i586.rpm
53a2d161d258fc6e37facf05a859ac69 ./1.5/RPMS/samba-common-2.2.8-3tr.i586.rpm
b6b7ace9c530cdc058dddc04328502b1 ./1.5/SRPMS/samba-2.2.8-3tr.src.rpm
- --------------------------------------------------------------------------


Trustix Security Team

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE+kqCFwRTcg4BxxS0RAnGXAKCDEcjuLR5OdiGZ6cYFUhlEtIUpygCeKn1b
lgg3AMgIBOIXeBYDfx9leyA=
=la2b
-----END PGP SIGNATURE-----


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »