Samba 2.0.5 security fixes

From: Andrew Tridgell (tridgeat_private)
Date: Tue Jul 20 1999 - 19:35:12 PDT

  • Next message: Aleph One: "Administrivia"

    -----BEGIN PGP SIGNED MESSAGE-----
    
    Samba 2.0.5 has just been released. This fixes a number of bugs,
    including 3 security holes. The security holes were discovered by Olaf
    Kirch (okirat_private) who performed a security audit on Samba for
    Caldera.
    
    The security holes were:
    
    1) a denial of service attack on nmbd (the netbios name service
       daemon). The attack made nmbd spin using up CPU resources until it
       was killed.
    
    2) A buffer overflow in the message service in smbd. This was
       exploitable if the system administrator had set the "message
       command" option in smb.conf. This option is not set by default.
    
    3) A race condition in smbmnt which would allow a user to mount at
       arbitrary points in the filesystem. This could only be exploited if
       smbmnt is setuid, which it is not by default.
    
    While no instances of these holes being exploited are known, it would
    not be wise to just ignore these issues. A motivated attacker could
    almost certainly produce an exploit very quickly.
    
    New release
    - -----------
    
    The Samba 2.0.5 release fixes these and other bugs. See
    http://www.samba.org/ for the release notes and download.
    
    The Samba 2.0.5 release has the following MD5 checksum
        9fa63ff151ae697648020df37464eca9 b samba-2.0.5.tar.gz
    
    Workarounds
    - -----------
    
    If you cannot upgrade to version 2.0.5 then we recommend the following
    action as temporary workarounds:
    
    1) remove the "message command" option from smb.conf if you have set
       it.
    
    2) remove the setuid bit from smbmnt if it is set (use "chmod u-s smbmnt")
    
    3) if nmbd starts using large amounts of CPU then kill and restart
       it.
    
    Credits
    - -------
    
    Thanks to Olaf Kirch and Caldera for their thorough security audit and
    help in producing a suitable fix.
    
    -----BEGIN PGP SIGNATURE-----
    Version: 2.6.3i
    Charset: noconv
    
    iQCVAwUBN5UxPWNSlURsK/StAQFWtQQAmGC1XjOdsqgLIHMZwPKvwk/dNP8biUlC
    1p7PN9cw+oTWeQMtjN9xX+UAAKK7wKzCL+hZiFigYWVGIWItC6oVJbGVqIqa2Ik1
    ThDi3oZ5411x1Hkadb+Ox9Xz8ZAmKw3euN6mnD1MbmMiZnnndnxTl9cneqWBkwS5
    fJp12Qf2fCc=
    =O11u
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 14:52:52 PDT