Users login

Create an account »


Users login

Home » Hacking News » Trustix TSLSA-2003-0011: samba remote root compromise

Trustix TSLSA-2003-0011: samba remote root compromise

by Nikola Strahija on March 21st, 2003 A buffer overrun has been found in all versions of Samba from 2.0.* to 2.2.7a inclusive. This allows a remote attacker to gain root privileges on a samba server.

Hash: SHA1

- --------------------------------------------------------------------------
Trustix Secure Linux Security Advisory #2003-0011

Package name: samba
Summary: Remote root compromise
Date: 2003-03-18
Affected versions: TSL 1.01, 1.1, 1.2, 1.5

- --------------------------------------------------------------------------
Package description:
Samba provides an SMB server which can be used to provide network
services to SMB (sometimes called "Lan Manager") clients, including
various versions of MS Windows, OS/2, and other Linux machines. Samba
uses NetBIOS over TCP/IP (NetBT) protocols and does NOT need NetBEUI
(Microsoft Raw NetBIOS frame) protocol.

Problem description:
A buffer overrun has been found in all versions of Samba from 2.0.*
to 2.2.7a inclusive. This allows a remote attacker to gain root
privileges on a samba server.

We recommend that all systems with this package installed be upgraded.
Please note that if you do not need the functionality provided by this
package, you may want to remove it from your system.

Note to users of 1.01, 1.1 and 1.2: This is a major upgrade. Please
make sure the upgrade went well.

All TSL updates are available from

About Trustix Secure Linux:
Trustix Secure Linux is a small Linux distribution for servers. With focus
on security and stability, the system is painlessly kept safe and up to
date from day one using swup, the automated software updater.

Automatic updates:
Users of the SWUP tool can enjoy having updates automatically
installed using 'swup --upgrade'.

Get SWUP from:

Public testing:
These packages have been available for public testing for some time.
If you want to contribute by testing the various packages in the
testing tree, please feel free to share your findings on the
tsl-discuss mailinglist.
The testing tree is located at

Check out our mailing lists:

This advisory along with all TSL packages are signed with the TSL sign key.
This key is available from:

The advisory itself is available from the errata pages at and
or directly at

MD5sums of the packages:
- --------------------------------------------------------------------------
85205bd02a486a7cf78a3024c82b9345 ./1.1/RPMS/samba-2.2.8-1tr.i586.rpm
737857165bef888a6f3dcab3eb23ae72 ./1.1/RPMS/samba-client-2.2.8-1tr.i586.rpm
c19635082b7b3020947cfce73a73c46a ./1.1/RPMS/samba-common-2.2.8-1tr.i586.rpm
41a6e603c790f447e26c30dadb7656e9 ./1.1/SRPMS/samba-2.2.8-1tr.src.rpm
b573f527f711fdd254cca8ceea6f7e9b ./1.2/RPMS/samba-2.2.8-1tr.i586.rpm
1618f2c6601523acb0963868097686ea ./1.2/RPMS/samba-client-2.2.8-1tr.i586.rpm
9fbe0e3fa074839dd18803e76411536e ./1.2/RPMS/samba-common-2.2.8-1tr.i586.rpm
20d4e0b39aa49967012055307327c0ff ./1.2/SRPMS/samba-2.2.8-1tr.src.rpm
ea570f59553616b8f5357eb2800aa902 ./1.5/RPMS/samba-2.2.8-1tr.i586.rpm
39363aa49754812771aba50901ea853f ./1.5/RPMS/samba-client-2.2.8-1tr.i586.rpm
eb6d6928ac6010163eed866dd53bb035 ./1.5/RPMS/samba-common-2.2.8-1tr.i586.rpm
20d4e0b39aa49967012055307327c0ff ./1.5/SRPMS/samba-2.2.8-1tr.src.rpm
- --------------------------------------------------------------------------

Trustix Security Team

Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see


Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.


Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »