LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: December 12th, 2014
Linux Security Week: December 9th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Red Hat: samba Improper account enabling vuln. Print E-mail
User Rating:      How can I rate this item?
Posted by LinuxSecurity.com Team   
RedHat Linux If an account for a user is created, but marked as disabled using the mksmbpasswd script, it is possible for Samba to overwrite the user's password with the contents of an uninitialized buffer.

Red Hat Security Advisory

Synopsis:          Updated samba packages fix security vulnerability
Advisory ID:       RHSA-2004:064-01
Issue date:        2004-02-18
Updated on:        2004-02-18
Product:           Red Hat Enterprise Linux
Keywords:          smb
Cross references:  
Obsoletes:         
CVE Names:         CAN-2004-0082
- ---------------------------------------------------------------------

1. Topic:

Updated Samba packages that fix a security vulnerability are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 - i386, ia64, ppc, ppc64, s390, s390x, x86_64
Red Hat Enterprise Linux ES version 3 - i386
Red Hat Enterprise Linux WS version 3 - i386, ia64, x86_64

3. Problem description:

Samba provides file and printer sharing services to SMB/CIFS clients.

The Samba team discovered an issue that affects version 3.0.0 and 3.0.1 of
Samba.  If an account for a user is created, but marked as disabled using
the mksmbpasswd script, it is possible for Samba to overwrite the user's
password with the contents of an uninitialized buffer.  This might lead to
a disabled account becoming enabled with a password that could be guessed
by an attacker.

Although this is likely to be a low risk issue for most Samba users, we
have provided updated packages, which contain a backported patch correcting
this issue.

Red Hat would like to thank the Samba team for reporting this issue and
providing us with a patch.

Note: Due to a packaging error in samba-3.0.0-14.3E, the winbind daemon is
not automatically restarted when the Samba package is upgraded.  After
up2date has installed the samba-3.0.2-4.3E packages, you must run
"/sbin/service winbind condrestart" as root to restart the winbind daemon.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed  (http://bugzilla.redhat.com/bugzilla for more info):

114995 - CAN-2004-0082 mksmbpasswd vulnerability

6. RPMs required:

Red Hat Enterprise Linux AS version 3:

SRPMS: 
ftp://updates.redhat.com/enterprise/3AS/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm

i386:
Available from Red Hat Network: samba-3.0.2-6.3E.i386.rpm
Available from Red Hat Network: samba-client-3.0.2-6.3E.i386.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.i386.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.i386.rpm

ia64:
Available from Red Hat Network: samba-3.0.2-6.3E.ia64.rpm
Available from Red Hat Network: samba-client-3.0.2-6.3E.ia64.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.ia64.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.ia64.rpm

ppc:
Available from Red Hat Network: samba-3.0.2-6.3E.ppc.rpm
Available from Red Hat Network: samba-client-3.0.2-6.3E.ppc.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.ppc.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.ppc.rpm

ppc64:
Available from Red Hat Network: samba-3.0.2-6.3E.ppc64.rpm
Available from Red Hat Network: samba-client-3.0.2-6.3E.ppc64.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.ppc64.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.ppc64.rpm

s390:
Available from Red Hat Network: samba-3.0.2-6.3E.s390.rpm
Available from Red Hat Network: samba-client-3.0.2-6.3E.s390.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.s390.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.s390.rpm

s390x:
Available from Red Hat Network: samba-3.0.2-6.3E.s390x.rpm
Available from Red Hat Network: samba-client-3.0.2-6.3E.s390x.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.s390x.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.s390x.rpm

x86_64:
Available from Red Hat Network: samba-3.0.2-6.3E.x86_64.rpm
Available from Red Hat Network: samba-client-3.0.2-6.3E.x86_64.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.x86_64.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.x86_64.rpm

Red Hat Enterprise Linux ES version 3:

SRPMS: 
ftp://updates.redhat.com/enterprise/3ES/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm

i386:
Available from Red Hat Network: samba-3.0.2-6.3E.i386.rpm
Available from Red Hat Network: samba-client-3.0.2-6.3E.i386.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.i386.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.i386.rpm

Red Hat Enterprise Linux WS version 3:

SRPMS: 
ftp://updates.redhat.com/enterprise/3WS/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm

i386:
Available from Red Hat Network: samba-3.0.2-6.3E.i386.rpm
Available from Red Hat Network: samba-client-3.0.2-6.3E.i386.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.i386.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.i386.rpm

ia64:
Available from Red Hat Network: samba-3.0.2-6.3E.ia64.rpm
Available from Red Hat Network: samba-client-3.0.2-6.3E.ia64.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.ia64.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.ia64.rpm

x86_64:
Available from Red Hat Network: samba-3.0.2-6.3E.x86_64.rpm
Available from Red Hat Network: samba-client-3.0.2-6.3E.x86_64.rpm
Available from Red Hat Network: samba-common-3.0.2-6.3E.x86_64.rpm
Available from Red Hat Network: samba-swat-3.0.2-6.3E.x86_64.rpm



7. Verification:

MD5 sum                          Package Name
- --------------------------------------------------------------------------

d80573d81d2e839ff95d6b2be63837be 3AS/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm
4894f9fa9e46dfc0e4d59c27c569a4c2 3AS/en/os/i386/samba-3.0.2-6.3E.i386.rpm
95796c3368430ba3893551699f9c5834 3AS/en/os/i386/samba-client-3.0.2-6.3E.i386.rpm
2306521c559190833b067585ac315945 3AS/en/os/i386/samba-common-3.0.2-6.3E.i386.rpm
90b778d53802ab039c1f18fd0aa64083 3AS/en/os/i386/samba-swat-3.0.2-6.3E.i386.rpm
b80cddc956ed6f5ad59043366a41bc4f 3AS/en/os/ia64/samba-3.0.2-6.3E.ia64.rpm
a7c2f086eccd48ff31ab2b9c75a767f3 3AS/en/os/ia64/samba-client-3.0.2-6.3E.ia64.rpm
9610be71c8d32a75d989d2b528b96d18 3AS/en/os/ia64/samba-common-3.0.2-6.3E.ia64.rpm
a13f133ace1afad2a6921d8b9e1883af 3AS/en/os/ia64/samba-swat-3.0.2-6.3E.ia64.rpm
203365f82bb7992916661bdb1aeb857d 3AS/en/os/ppc/samba-3.0.2-6.3E.ppc.rpm
eb79808dbb47e491ff9d18defccda118 3AS/en/os/ppc/samba-client-3.0.2-6.3E.ppc.rpm
617b3c631fc76575af934245e6635f3d 3AS/en/os/ppc/samba-common-3.0.2-6.3E.ppc.rpm
391ba4ffc0fbc242b14facdec568a558 3AS/en/os/ppc/samba-swat-3.0.2-6.3E.ppc.rpm
24e48c200f963a688b098649a64a32bf 3AS/en/os/ppc64/samba-3.0.2-6.3E.ppc64.rpm
54f7dff06672a363999627643722fb50 3AS/en/os/ppc64/samba-client-3.0.2-6.3E.ppc64.rpm
d3786f261843e4ada797ae42bafbc9db 3AS/en/os/ppc64/samba-common-3.0.2-6.3E.ppc64.rpm
916bf4c08d8208998789f199e50c49c9 3AS/en/os/ppc64/samba-swat-3.0.2-6.3E.ppc64.rpm
43f9d50ff38ad6818276f958face9996 3AS/en/os/s390/samba-3.0.2-6.3E.s390.rpm
cc15a68397c220b763091f8c2da677d0 3AS/en/os/s390/samba-client-3.0.2-6.3E.s390.rpm
794f3e221a7e767248077ea33025a28d 3AS/en/os/s390/samba-common-3.0.2-6.3E.s390.rpm
766d56a66ee1e3ad920bc4af61784265 3AS/en/os/s390/samba-swat-3.0.2-6.3E.s390.rpm
2efbf724256045ca176310523163cdd5 3AS/en/os/s390x/samba-3.0.2-6.3E.s390x.rpm
1a47701428c8eacd7bf45603c8902e0a 3AS/en/os/s390x/samba-client-3.0.2-6.3E.s390x.rpm
8d22e6863316410073b26a295c19a769 3AS/en/os/s390x/samba-common-3.0.2-6.3E.s390x.rpm
6ba3fd33c327bf348910bb8042188a4e 3AS/en/os/s390x/samba-swat-3.0.2-6.3E.s390x.rpm
df382357df3280a33d9586025138d3a0 3AS/en/os/x86_64/samba-3.0.2-6.3E.x86_64.rpm
44e7c0335c0021d3a23f6102ebd3acb3 3AS/en/os/x86_64/samba-client-3.0.2-6.3E.x86_64.rpm
ee2ee02f6421e3d08ef9e75f9c5f7392 3AS/en/os/x86_64/samba-common-3.0.2-6.3E.x86_64.rpm
3cf5454d6c959e3fabcbaf74f69afc0f 3AS/en/os/x86_64/samba-swat-3.0.2-6.3E.x86_64.rpm
d80573d81d2e839ff95d6b2be63837be 3ES/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm
4894f9fa9e46dfc0e4d59c27c569a4c2 3ES/en/os/i386/samba-3.0.2-6.3E.i386.rpm
95796c3368430ba3893551699f9c5834 3ES/en/os/i386/samba-client-3.0.2-6.3E.i386.rpm
2306521c559190833b067585ac315945 3ES/en/os/i386/samba-common-3.0.2-6.3E.i386.rpm
90b778d53802ab039c1f18fd0aa64083 3ES/en/os/i386/samba-swat-3.0.2-6.3E.i386.rpm
d80573d81d2e839ff95d6b2be63837be 3WS/en/os/SRPMS/samba-3.0.2-6.3E.src.rpm
4894f9fa9e46dfc0e4d59c27c569a4c2 3WS/en/os/i386/samba-3.0.2-6.3E.i386.rpm
95796c3368430ba3893551699f9c5834 3WS/en/os/i386/samba-client-3.0.2-6.3E.i386.rpm
2306521c559190833b067585ac315945 3WS/en/os/i386/samba-common-3.0.2-6.3E.i386.rpm
90b778d53802ab039c1f18fd0aa64083 3WS/en/os/i386/samba-swat-3.0.2-6.3E.i386.rpm
b80cddc956ed6f5ad59043366a41bc4f 3WS/en/os/ia64/samba-3.0.2-6.3E.ia64.rpm
a7c2f086eccd48ff31ab2b9c75a767f3 3WS/en/os/ia64/samba-client-3.0.2-6.3E.ia64.rpm
9610be71c8d32a75d989d2b528b96d18 3WS/en/os/ia64/samba-common-3.0.2-6.3E.ia64.rpm
a13f133ace1afad2a6921d8b9e1883af 3WS/en/os/ia64/samba-swat-3.0.2-6.3E.ia64.rpm
df382357df3280a33d9586025138d3a0 3WS/en/os/x86_64/samba-3.0.2-6.3E.x86_64.rpm
44e7c0335c0021d3a23f6102ebd3acb3 3WS/en/os/x86_64/samba-client-3.0.2-6.3E.x86_64.rpm
ee2ee02f6421e3d08ef9e75f9c5f7392 3WS/en/os/x86_64/samba-common-3.0.2-6.3E.x86_64.rpm
3cf5454d6c959e3fabcbaf74f69afc0f 3WS/en/os/x86_64/samba-swat-3.0.2-6.3E.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key is
available from https://www.redhat.com/security/keys.html

You can verify each package with the following command:
    
    rpm --checksig -v 

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum 


8. References:
 
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0082

9. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFAM0AzXlSAg2UNWIIRArMcAJ9/8wwXhhP+g1igPs059WKP1a4tvACgwxZ1
9TgwQwl43MHBcXZD37NZ8j8=
=Dxv+

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
OphionLocker, A New Ransomware uses Elliptic Curve for Encryption
This Linux grinch could put a hole in your security stocking
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.