Red Hat Security Advisory

Synopsis:          Updated samba packages fix vulnerability
Advisory ID:       RHSA-2004:404-01
Issue date:        2004-07-26
Updated on:        2004-07-26
Product:           Red Hat Enterprise Linux
Keywords:          smb
CVE Names:         CAN-2004-0686
- ---------------------------------------------------------------------

1. Summary:

Updated samba packages that fix a buffer overflow issue are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64
Red Hat Linux Advanced Workstation 2.1 - ia64
Red Hat Enterprise Linux ES version 2.1 - i386
Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

Samba provides file and printer sharing services to SMB/CIFS clients.   
   
The Samba team discovered a buffer overflow in the code used to support 
the 'mangling method = hash' smb.conf option.  The Common Vulnerabilities 
and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0686 
to this issue. 
 
All users of Samba should upgrade to these updated packages, which 
contain an upgrade to Samba-2.2.10, which is not vulnerable to this 
issue.

4. Solution:

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.  Use Red Hat
Network to download and update your packages.  To launch the Red Hat
Update Agent, use the following command:

    up2date

For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:

     http://www.redhat.com/docs/manuals/enterprise/

5. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: 

1ee2bacd36e372f10b99162385299c3f  samba-2.2.10-1.21as.1.src.rpm

i386:
f518e625fc9de6d34c397b09cf26d565  samba-2.2.10-1.21as.1.i386.rpm
74ce0506f42a07bc967d6e26fa23c981  samba-client-2.2.10-1.21as.1.i386.rpm
f25de670ff892be92aaa7c51d14e0eb5  samba-common-2.2.10-1.21as.1.i386.rpm
d0243bc57d8f6a76d11ee5707d1d9333  samba-swat-2.2.10-1.21as.1.i386.rpm

ia64:
d07832bf7102b64c4083472c9b965992  samba-2.2.10-1.21as.1.ia64.rpm
1ac0c3cb43cb044d1a677fcac3dc839e  samba-client-2.2.10-1.21as.1.ia64.rpm
65cba5ff09bd7e0f140fce2618d19ebc  samba-common-2.2.10-1.21as.1.ia64.rpm
a45106d65cd86f8ff6be66ba9604ee11  samba-swat-2.2.10-1.21as.1.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS: 

1ee2bacd36e372f10b99162385299c3f  samba-2.2.10-1.21as.1.src.rpm

ia64:
d07832bf7102b64c4083472c9b965992  samba-2.2.10-1.21as.1.ia64.rpm
1ac0c3cb43cb044d1a677fcac3dc839e  samba-client-2.2.10-1.21as.1.ia64.rpm
65cba5ff09bd7e0f140fce2618d19ebc  samba-common-2.2.10-1.21as.1.ia64.rpm
a45106d65cd86f8ff6be66ba9604ee11  samba-swat-2.2.10-1.21as.1.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS: 

1ee2bacd36e372f10b99162385299c3f  samba-2.2.10-1.21as.1.src.rpm

i386:
f518e625fc9de6d34c397b09cf26d565  samba-2.2.10-1.21as.1.i386.rpm
74ce0506f42a07bc967d6e26fa23c981  samba-client-2.2.10-1.21as.1.i386.rpm
f25de670ff892be92aaa7c51d14e0eb5  samba-common-2.2.10-1.21as.1.i386.rpm
d0243bc57d8f6a76d11ee5707d1d9333  samba-swat-2.2.10-1.21as.1.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: 

1ee2bacd36e372f10b99162385299c3f  samba-2.2.10-1.21as.1.src.rpm

i386:
f518e625fc9de6d34c397b09cf26d565  samba-2.2.10-1.21as.1.i386.rpm
74ce0506f42a07bc967d6e26fa23c981  samba-client-2.2.10-1.21as.1.i386.rpm
f25de670ff892be92aaa7c51d14e0eb5  samba-common-2.2.10-1.21as.1.i386.rpm
d0243bc57d8f6a76d11ee5707d1d9333  samba-swat-2.2.10-1.21as.1.i386.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
 

6. References:
 
CVE -CVE-2004-0686

7. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at  

Copyright 2004 Red Hat, Inc.

Red Hat: samba Buffer overflow vulnerability

The Samba team discovered a buffer overflow in the code used to support the 'mangling method = hash' smb.conf option.

Summary



Summary

Samba provides file and printer sharing services to SMB/CIFS clients. The Samba team discovered a buffer overflow in the code used to support the 'mangling method = hash' smb.conf option. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0686 to this issue. All users of Samba should upgrade to these updated packages, which contain an upgrade to Samba-2.2.10, which is not vulnerable to this issue.


Solution

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:
http://www.redhat.com/docs/manuals/enterprise/
5. RPMs required:
Red Hat Enterprise Linux AS (Advanced Server) version 2.1:
SRPMS:
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
i386: f518e625fc9de6d34c397b09cf26d565 samba-2.2.10-1.21as.1.i386.rpm 74ce0506f42a07bc967d6e26fa23c981 samba-client-2.2.10-1.21as.1.i386.rpm f25de670ff892be92aaa7c51d14e0eb5 samba-common-2.2.10-1.21as.1.i386.rpm d0243bc57d8f6a76d11ee5707d1d9333 samba-swat-2.2.10-1.21as.1.i386.rpm
ia64: d07832bf7102b64c4083472c9b965992 samba-2.2.10-1.21as.1.ia64.rpm 1ac0c3cb43cb044d1a677fcac3dc839e samba-client-2.2.10-1.21as.1.ia64.rpm 65cba5ff09bd7e0f140fce2618d19ebc samba-common-2.2.10-1.21as.1.ia64.rpm a45106d65cd86f8ff6be66ba9604ee11 samba-swat-2.2.10-1.21as.1.ia64.rpm
Red Hat Linux Advanced Workstation 2.1:
SRPMS:
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
ia64: d07832bf7102b64c4083472c9b965992 samba-2.2.10-1.21as.1.ia64.rpm 1ac0c3cb43cb044d1a677fcac3dc839e samba-client-2.2.10-1.21as.1.ia64.rpm 65cba5ff09bd7e0f140fce2618d19ebc samba-common-2.2.10-1.21as.1.ia64.rpm a45106d65cd86f8ff6be66ba9604ee11 samba-swat-2.2.10-1.21as.1.ia64.rpm
Red Hat Enterprise Linux ES version 2.1:
SRPMS:
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
i386: f518e625fc9de6d34c397b09cf26d565 samba-2.2.10-1.21as.1.i386.rpm 74ce0506f42a07bc967d6e26fa23c981 samba-client-2.2.10-1.21as.1.i386.rpm f25de670ff892be92aaa7c51d14e0eb5 samba-common-2.2.10-1.21as.1.i386.rpm d0243bc57d8f6a76d11ee5707d1d9333 samba-swat-2.2.10-1.21as.1.i386.rpm
Red Hat Enterprise Linux WS version 2.1:
SRPMS:
1ee2bacd36e372f10b99162385299c3f samba-2.2.10-1.21as.1.src.rpm
i386: f518e625fc9de6d34c397b09cf26d565 samba-2.2.10-1.21as.1.i386.rpm 74ce0506f42a07bc967d6e26fa23c981 samba-client-2.2.10-1.21as.1.i386.rpm f25de670ff892be92aaa7c51d14e0eb5 samba-common-2.2.10-1.21as.1.i386.rpm d0243bc57d8f6a76d11ee5707d1d9333 samba-swat-2.2.10-1.21as.1.i386.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from

References

Package List


Severity
Advisory ID: RHSA-2004:404-01
Issued Date: : 2004-07-26
Updated on: 2004-07-26
Product: Red Hat Enterprise Linux
Keywords: smb
CVE Names: CAN-2004-0686

Topic

Updated samba packages that fix a buffer overflow issue are now available.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64

Red Hat Linux Advanced Workstation 2.1 - ia64

Red Hat Enterprise Linux ES version 2.1 - i386

Red Hat Enterprise Linux WS version 2.1 - i386


Bugs Fixed


Related News