USN-544-1: Samba vulnerabilities

Publication date

16 November 2007

Overview

Samba vulnerabilities


Packages

Details

Samba developers discovered that nmbd could be made to overrun a buffer
during the processing of GETDC logon server requests. When samba is
configured as a Primary or Backup Domain Controller, a remote attacker
could send malicious logon requests and possibly cause a denial of
service. (CVE-2007-4572)

Alin Rad Pop of Secunia Research discovered that nmbd did not properly
check the length of netbios packets. When samba is configured as a WINS
server, a remote attacker could send multiple crafted requests resulting
in the execution of arbitrary code with root privileges. (CVE-2007-5398)

Samba developers discovered that nmbd could be made to overrun a buffer
during the processing of GETDC logon server requests. When samba is
configured as a Primary or Backup Domain Controller, a remote attacker
could send malicious logon requests and possibly cause a denial of
service. (CVE-2007-4572)

Alin Rad Pop of Secunia Research discovered that nmbd did not properly
check the length of netbios packets. When samba is configured as a WINS
server, a remote attacker could send multiple crafted requests resulting
in the execution of arbitrary code with root privileges. (CVE-2007-5398)

Update instructions

In general, a standard system upgrade is sufficient to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
7.10 gutsy samba –  3.0.26a-1ubuntu2.1
7.04 feisty samba –  3.0.24-2ubuntu1.3
6.10 edgy samba –  3.0.22-1ubuntu4.3
6.06 dapper samba –  3.0.22-1ubuntu3.4

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›