lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4198AE84.7020509@samba.org> Date: Mon, 15 Nov 2004 07:26:28 -0600 From: "Gerald (Jerry) Carter" <jerry@...ba.org> To: bugtraq@...urityfocus.com Subject: [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Subject: Possible Buffer Overrun in smbd CVE #: CAN-2004-0882 Affected Versions: Samba 3.0.x <= 3.0.7 Summary: A possible buffer overrun in smbd could lead to code execution by a remote user Patch Availability - - ------------------ A patch for Samba 3.0.7 (samba-3.0.7-CAN-2004-0882.patch) is available from http://www.samba.org/samba/ftp/patches/security/. The patch has been signed with the "Samba Distribution Verification Key" (ID F17F9772). Description - - ----------- Invalid bounds checking in reply to certain trans2 requests could result in a buffer overrun in smbd. In order to exploit this defect, the attacker must be able to create files with very specific Unicode filenames on the Samba share. Protecting Unpatched Servers - - ---------------------------- The Samba Team always encourages users to run the latest stable release as a defense of against attacks. However, under certain circumstances it may not be possible to immediately upgrade important installations. In such cases, administrators should read the "Server Security" documentation found at http://www.samba.org/samba/docs/server_security.html. Credits - - -------- This security issue was reported to Samba developers by Stefan Esser from e-matters Security (http://security.e-matters.de/). - - -- Our Code, Our Bugs, Our Responsibility. ~ -- The Samba Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org iD8DBQFBmK56IR7qMdg1EfYRAr/7AKCyPlfil+TTxI+IqJsMhXqaXVf2BgCg3FIy b/27yHDy7RBA7Wf7z8u6IUw= =+U47 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists