lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 15 Nov 2004 07:26:28 -0600
From: "Gerald (Jerry) Carter" <jerry@...ba.org>
To: bugtraq@...urityfocus.com
Subject: [SAMBA] CAN-2004-0882: Possiebl Buffer Overrun in smbd


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Subject:	Possible Buffer Overrun in smbd
CVE #: 		CAN-2004-0882
Affected
Versions:	Samba 3.0.x <= 3.0.7

Summary: 	A possible buffer overrun in smbd could
		lead to code execution by a remote user


Patch Availability
- - ------------------

A patch for Samba 3.0.7 (samba-3.0.7-CAN-2004-0882.patch) is
available from http://www.samba.org/samba/ftp/patches/security/.
The patch has been signed with the "Samba Distribution Verification
Key"  (ID F17F9772).


Description
- - -----------

Invalid bounds checking in reply to certain trans2 requests
could result in a buffer overrun in smbd.  In order to exploit
this defect, the attacker must be able to create files with very
specific Unicode filenames on the Samba share.


Protecting Unpatched Servers
- - ----------------------------

The Samba Team always encourages users to run the latest stable
release as a defense of against attacks.  However, under certain
circumstances it may not be possible to immediately upgrade
important installations.  In such cases, administrators should
read the "Server Security" documentation found at
http://www.samba.org/samba/docs/server_security.html.


Credits
- - --------

This security issue was reported to Samba developers by Stefan
Esser from e-matters Security (http://security.e-matters.de/).



- - -- Our Code, Our Bugs, Our Responsibility.

~       -- The Samba Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFBmK56IR7qMdg1EfYRAr/7AKCyPlfil+TTxI+IqJsMhXqaXVf2BgCg3FIy
b/27yHDy7RBA7Wf7z8u6IUw=
=+U47
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ