lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Sat, 29 Mar 2003 13:09:04 -0500
From: White Vampire <whitevampire@...dless.com>
To: bugtraq@...urityfocus.com
Subject: [security@...ckware.com: [slackware-security]  Samba buffer overflow fixed]


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----- Forwarded message from Slackware Security Team <security@...ckware.com> -----

Return-Path: <owner-slackware-security@....slackware.com>
Delivered-To: whitvamp@...alhost
Received: (qmail 18002 invoked from network); 25 Mar 2003 19:18:43 -0000
Received: from localhost (127.0.0.1)
  by localhost with SMTP; 25 Mar 2003 19:18:43 -0000
Delivered-To: vampwhit@...ly.csoft.net
Received: from mail102.csoft.net [63.111.26.110]
	by localhost with POP3 (fetchmail-5.8.3)
	for whitvamp@...alhost (single-drop); Tue, 25 Mar 2003 14:18:43 -0500 (EST)
Received: (qmail 7867 invoked from network); 16 Mar 2003 00:25:11 -0000
Received: from unknown (HELO mta1-3.us4.outblaze.com) (205.158.62.44)
  by mail102.csoft.net with SMTP; 16 Mar 2003 00:25:11 -0000
Received: from spf12.us4.outblaze.com (205-158-62-36.outblaze.com [205.158.62.36])
	by mta1-3.us4.outblaze.com (Postfix) with ESMTP id 55B766ECCB4
	for <vampwhit@...ly.csoft.net>; Sun, 16 Mar 2003 00:21:13 +0000 (GMT)
Received: from spf8.us4.outblaze.com (205-158-62-35.outblaze.com [205.158.62.35])
	by spf12.us4.outblaze.com (Postfix) with ESMTP id 3D9BA58036
	for <whitevampire@...dless.com>; Sun, 16 Mar 2003 00:16:13 +0000 (GMT)
Received: from bob.slackware.com (slackware.com [64.57.102.34])
	by spf8.us4.outblaze.com (8.12.8/8.12.7) with ESMTP id h2G0LCQu012305
	for <whitevampire@...dless.com>; Sun, 16 Mar 2003 00:21:12 GMT
Received: (from daemon@...alhost)
	by bob.slackware.com (8.11.6/8.11.6) id h2FMtNZ04882
	for slackware-security-outgoing; Sat, 15 Mar 2003 14:55:23 -0800
Received: from localhost (security@...alhost)
	by bob.slackware.com (8.11.6/8.11.6) with ESMTP id h2FMtM704879
	for <slackware-security@...ckware.com>; Sat, 15 Mar 2003 14:55:22 -0800
Date: Sat, 15 Mar 2003 14:55:22 -0800 (PST)
From: Slackware Security Team <security@...ckware.com>
To: slackware-security@...ckware.com
Subject: [slackware-security]  Samba buffer overflow fixed
Message-ID: <Pine.LNX.4.21.0303151454380.4864-100000@....slackware.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Sender: owner-slackware-security@...ckware.com
Precedence: bulk
Reply-To: Slackware Security Team <security@...ckware.com>


- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  Samba buffer overflow fixed

The samba packages in Slackware 8.1 and -current have been patched to fix
a security problem.  All sites running samba should upgrade.  


Here are the details from the Slackware 8.1 ChangeLog:
+--------------------------+
Sat Mar 15 13:49:04 PST 2003
patches/packages/samba-2.2.8-i386-1.tgz:  Upgraded to Samba 2.2.8.

  From the Samba web site:

     * (14th Mar, 2003) Security Release - Samba 2.2.8

     A flaw has been detected in the Samba main smbd code which
     could allow an external attacker to remotely and anonymously
     gain Super User (root) privileges on a server running a
     Samba server. This flaw exists in previous versions of Samba
     from 2.0.x to 2.2.7a inclusive. This is a serious problem
     and all sites should either upgrade to Samba 2.2.8
     immediately or prohibit access to TCP ports 139 and 445.

(* Security fix *)
+--------------------------+

More information may be found in the Samba release notes.



WHERE TO FIND THE NEW PACKAGES:
+-----------------------------+

Updated Samba package for Slackware 8.1:
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/samba-2.2.8-i386-1.tgz

Updated Samba package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/samba-2.2.8-i386-1.tgz



MD5 SIGNATURES:
+-------------+

Here are the md5sums for the packages:

Slackware 8.1 package:
be4bee0ed2c50e9313150843e41b09ad  samba-2.2.8-i386-1.tgz

Slackware -current package:
940d26d3f74763524976a61f44637b22  samba-2.2.8-i386-1.tgz



INSTALLATION INSTRUCTIONS:
+------------------------+

As root, upgrade the samba package(s) with upgradepkg:

upgradepkg samba-2.2.8-i386-1.tgz

Then, restart samba:

/etc/rc.d/rc.samba restart



+-----+

Slackware Linux Security Team
http://slackware.com/gpg-key
security@...ckware.com

+------------------------------------------------------------------------+
| HOW TO REMOVE YOURSELF FROM THIS MAILING LIST:                         |
+------------------------------------------------------------------------+
| Send an email to majordomo@...ckware.com with this text in the body of |
| the email message:                                                     |
|                                                                        |
|   unsubscribe slackware-security                                       |
|                                                                        |
| You will get a confirmation message back.  Follow the instructions to  |
| complete the unsubscription.  Do not reply to this message to          |
| unsubscribe!                                                           |
+------------------------------------------------------------------------+

- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+c6CcakRjwEAQIjMRAksxAJ4jbhqBtqRD2FqGIx5bVFg8isApwwCfSO2C
VZ9TRhF307P8DfFZn6jo4f4=
=V9F1
- -----END PGP SIGNATURE-----



- ----- End forwarded message -----

- -- 
\   | \  /  White Vampire\Rem                |  http://gammaforce.org/
 \|\|  \/   whitevampire@...dless.com        |  http://gammagear.com/
"Silly hacker, root is for administrators."  |  http://webfringe.com/

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.5 (GNU/Linux)

iD8DBQE+heFA3+rxmnEDyl8RAqv9AJ0RmzsMAB5ceihz9SO594A/BHo+vQCfe99d
QKPR5TuS7rEgagv4UpwecQk=
=SRoG
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists