Home > Security > Advisories

Advisories

Mandriva Advisories

Package name samba
Date April 7th, 2003
Advisory ID MDKSA-2003:044
Affected versions 8.2, 9.0, 9.1, MNF8.2, CS2.1
Synopsis Updated samba packages fix remote root vulnerability

Problem Description

An exploitable buffer overflow was discovered in the Samba server that
can lead to an anonymous remote root compromise. The Samba Team also
discovered some potential overflows during an internal code audit which
was done in response to the previously noted buffer overflow problem.

All versions of Samba prior to 2.2.8a are vulnerable. The provided
updates contain a patch from the Samba Team to correct the issue.

An exploit is known to exist and all Mandrake Linux users are
encouraged to upgrade immediately.

Updated Packages

Mandrakelinux 8.2

 e207c883fcc61a3b93f7794a651bdc80  8.2/RPMS/nss_wins-2.2.7a-9.2mdk.i586.rpm
021e8bb91b942c3da85a4b954de9e28e  8.2/RPMS/samba-client-2.2.7a-9.2mdk.i586.rpm
fa751f2b1ac7f3172e1af645465caf21  8.2/RPMS/samba-common-2.2.7a-9.2mdk.i586.rpm
2cf51777e9dcda14f1103d06f380742a  8.2/RPMS/samba-doc-2.2.7a-9.2mdk.i586.rpm
e160bdc80ae180aa7dadae2a0c64fd32  8.2/RPMS/samba-server-2.2.7a-9.2mdk.i586.rpm
de2247d10bfaac07d2b9dacc6c55d652  8.2/RPMS/samba-swat-2.2.7a-9.2mdk.i586.rpm
355809847a6567ab3fd1dc7bea0c0362  8.2/RPMS/samba-winbind-2.2.7a-9.2mdk.i586.rpm
f42ea9eda795771deaec003f69bec76e  8.2/SRPMS/samba-2.2.7a-9.2mdk.src.rpm

Mandrakelinux 8.2/PPC

 e56e6cc2bf7d3b623a1266a77597f5bb  ppc/8.2/RPMS/nss_wins-2.2.7a-9.2mdk.ppc.rpm
7c290f95fcd2dbdb1b77566f234d5c70  ppc/8.2/RPMS/samba-client-2.2.7a-9.2mdk.ppc.rpm
6b0e979184a8d213e69e8bca01e6ff3c  ppc/8.2/RPMS/samba-common-2.2.7a-9.2mdk.ppc.rpm
cfe3b16024ae9e1c19adc25ae01515d1  ppc/8.2/RPMS/samba-doc-2.2.7a-9.2mdk.ppc.rpm
da6960246589e5ad2093c377f01d8333  ppc/8.2/RPMS/samba-server-2.2.7a-9.2mdk.ppc.rpm
9c1ba51f3659593d2a52d6b86f953ebb  ppc/8.2/RPMS/samba-swat-2.2.7a-9.2mdk.ppc.rpm
c7ee3154ebaa8e1c4923ccf1f15b4baf  ppc/8.2/RPMS/samba-winbind-2.2.7a-9.2mdk.ppc.rpm
f42ea9eda795771deaec003f69bec76e  ppc/8.2/SRPMS/samba-2.2.7a-9.2mdk.src.rpm

Mandrakelinux 9.0

 8321018fc90e4bc68dadab4d72521c87  9.0/RPMS/nss_wins-2.2.7a-9.2mdk.i586.rpm
11da01c105f26b4ec14d66d5f409fb89  9.0/RPMS/samba-client-2.2.7a-9.2mdk.i586.rpm
cb519586ae1ebfa2e7a1d47b35c74a11  9.0/RPMS/samba-common-2.2.7a-9.2mdk.i586.rpm
611e135abef662cde6cd3fd4ea8ed5a3  9.0/RPMS/samba-doc-2.2.7a-9.2mdk.i586.rpm
e9d92f1d7242017f92a95ec5b650e6f1  9.0/RPMS/samba-server-2.2.7a-9.2mdk.i586.rpm
30d9c64e5471e528948503363dc411b9  9.0/RPMS/samba-swat-2.2.7a-9.2mdk.i586.rpm
676e104d5e9a9438647fc4988b757d07  9.0/RPMS/samba-winbind-2.2.7a-9.2mdk.i586.rpm
f42ea9eda795771deaec003f69bec76e  9.0/SRPMS/samba-2.2.7a-9.2mdk.src.rpm

Mandrakelinux 9.1

 524b564fae35498da1d62aaeeacb8856  9.1/RPMS/nss_wins-2.2.7a-9.2mdk.i586.rpm
7b92e69f651cd84fecb83d162f8da235  9.1/RPMS/samba-client-2.2.7a-9.2mdk.i586.rpm
5523f60af9b0dede59157c46a67839c0  9.1/RPMS/samba-common-2.2.7a-9.2mdk.i586.rpm
92eb939169c44addc2af6b89784c8e34  9.1/RPMS/samba-doc-2.2.7a-9.2mdk.i586.rpm
5e2cf00a17ded9b93d545d708089dd91  9.1/RPMS/samba-server-2.2.7a-9.2mdk.i586.rpm
e8192e6a5a416004146f5f20eadae7c1  9.1/RPMS/samba-swat-2.2.7a-9.2mdk.i586.rpm
0a10e256cd28848d38f84a45a6e8db22  9.1/RPMS/samba-winbind-2.2.7a-9.2mdk.i586.rpm
f42ea9eda795771deaec003f69bec76e  9.1/SRPMS/samba-2.2.7a-9.2mdk.src.rpm

Mandrakelinux 9.1/PPC

 ac688d92894403dd5e8c3f3810b839e6  ppc/9.1/RPMS/nss_wins-2.2.7a-9.2mdk.ppc.rpm
a75aacf65500187c133609189ba540a8  ppc/9.1/RPMS/samba-client-2.2.7a-9.2mdk.ppc.rpm
07bc6f486fc99b6c67f8f0278a8ef9ea  ppc/9.1/RPMS/samba-common-2.2.7a-9.2mdk.ppc.rpm
74a796994e0d35b549eb3e5ea9f145f8  ppc/9.1/RPMS/samba-doc-2.2.7a-9.2mdk.ppc.rpm
ee1b94e4363a1ccfe385d76d440c713b  ppc/9.1/RPMS/samba-server-2.2.7a-9.2mdk.ppc.rpm
1c025c015833e159de67aa1112949a54  ppc/9.1/RPMS/samba-swat-2.2.7a-9.2mdk.ppc.rpm
5c4d5af655bc2493ad296f78654dda18  ppc/9.1/RPMS/samba-winbind-2.2.7a-9.2mdk.ppc.rpm
f42ea9eda795771deaec003f69bec76e  ppc/9.1/SRPMS/samba-2.2.7a-9.2mdk.src.rpm

Multi Network Firewall 8.2

 021e8bb91b942c3da85a4b954de9e28e  mnf8.2/RPMS/samba-client-2.2.7a-9.2mdk.i586.rpm
fa751f2b1ac7f3172e1af645465caf21  mnf8.2/RPMS/samba-common-2.2.7a-9.2mdk.i586.rpm
f42ea9eda795771deaec003f69bec76e  mnf8.2/SRPMS/samba-2.2.7a-9.2mdk.src.rpm

Corporate Server 2.1

 8321018fc90e4bc68dadab4d72521c87  corporate/2.1/RPMS/nss_wins-2.2.7a-9.2mdk.i586.rpm
11da01c105f26b4ec14d66d5f409fb89  corporate/2.1/RPMS/samba-client-2.2.7a-9.2mdk.i586.rpm
cb519586ae1ebfa2e7a1d47b35c74a11  corporate/2.1/RPMS/samba-common-2.2.7a-9.2mdk.i586.rpm
611e135abef662cde6cd3fd4ea8ed5a3  corporate/2.1/RPMS/samba-doc-2.2.7a-9.2mdk.i586.rpm
e9d92f1d7242017f92a95ec5b650e6f1  corporate/2.1/RPMS/samba-server-2.2.7a-9.2mdk.i586.rpm
30d9c64e5471e528948503363dc411b9  corporate/2.1/RPMS/samba-swat-2.2.7a-9.2mdk.i586.rpm
676e104d5e9a9438647fc4988b757d07  corporate/2.1/RPMS/samba-winbind-2.2.7a-9.2mdk.i586.rpm
f42ea9eda795771deaec003f69bec76e  corporate/2.1/SRPMS/samba-2.2.7a-9.2mdk.src.rpm

Corporate Server 2.1/X86_64

 c370d2e305309c429e2c50b9d2cd3fa0  x86_64/corporate/2.1/RPMS/nss_wins-2.2.7a-9.2mdk.x86_64.rpm
876213463a565f7f1f7665e5bb99a67c  x86_64/corporate/2.1/RPMS/samba-client-2.2.7a-9.2mdk.x86_64.rpm
ef97988372577b868a96c714c6aea652  x86_64/corporate/2.1/RPMS/samba-common-2.2.7a-9.2mdk.x86_64.rpm
4d80171b412b2514198c5de15c953f2a  x86_64/corporate/2.1/RPMS/samba-doc-2.2.7a-9.2mdk.x86_64.rpm
1689edc92e1dbef8e959ac868feeddba  x86_64/corporate/2.1/RPMS/samba-server-2.2.7a-9.2mdk.x86_64.rpm
aee8cd3ad3c8fe9fcc936236d278b0a7  x86_64/corporate/2.1/RPMS/samba-swat-2.2.7a-9.2mdk.x86_64.rpm
778b4c83848264b620e038da99a0630c  x86_64/corporate/2.1/RPMS/samba-winbind-2.2.7a-9.2mdk.x86_64.rpm
f42ea9eda795771deaec003f69bec76e  x86_64/corporate/2.1/SRPMS/samba-2.2.7a-9.2mdk.src.rpm

References

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0201
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0196

Upgrade

To upgrade automatically, use MandrivaUpdate.


Verification

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :

                rpm --checksig package.rpm
                

You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.

If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.