USN-617-1: Samba vulnerabilities

Publication date

17 June 2008

Overview

Samba vulnerabilities


Packages

Details

Samba developers discovered that nmbd could be made to overrun
a buffer during the processing of GETDC logon server requests.
When samba is configured as a Primary or Backup Domain Controller,
a remote attacker could send malicious logon requests and possibly
cause a denial of service. (CVE-2007-4572)

Alin Rad Pop of Secunia Research discovered that Samba did not
properly perform bounds checking when parsing SMB replies. A remote
attacker could send crafted SMB packets and execute arbitrary code.
(CVE-2008-1105)

Samba developers discovered that nmbd could be made to overrun
a buffer during the processing of GETDC logon server requests.
When samba is configured as a Primary or Backup Domain Controller,
a remote attacker could send malicious logon requests and possibly
cause a denial of service. (CVE-2007-4572)

Alin Rad Pop of Secunia Research discovered that Samba did not
properly perform bounds checking when parsing SMB replies. A remote
attacker could send crafted SMB packets and execute arbitrary code.
(CVE-2008-1105)

Update instructions

In general, a standard system upgrade is sufficient to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
8.04 hardy libsmbclient –  3.0.28a-1ubuntu4.2
samba –  3.0.28a-1ubuntu4.2
7.10 gutsy libsmbclient –  3.0.26a-1ubuntu2.4
samba –  3.0.26a-1ubuntu2.4
7.04 feisty libsmbclient –  3.0.24-2ubuntu1.6
samba –  3.0.24-2ubuntu1.6
6.06 dapper libsmbclient –  3.0.22-1ubuntu3.7
samba –  3.0.22-1ubuntu3.7

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›