<H1>Vulnerability Note VU#298233</H1>
<H2>Samba contains buffer overflow in SMB/CIFS packet fragment reassembly code</H2><A name=overview>
<H3>Overview</H3></A>A buffer overflow vulnerability has been discovered in Samba. An updated version has been released. <A name=description>
<H3>I. Description</H3></A>A remotely exploitable buffer overflow vulnerability was discoved to affect Samba versions 2.0.x through 2.2.7a. From their <A href="http://www.samba.org/samba/whatsnew/samba-2.2.8.html"><FONT color=#0000ff>bulletin</FONT></A>:
<UL>
<P><I>The SuSE security audit team, in particular Sebastian Krahmer, has found a flaw in the Samba main smbd code which could allow an external attacker to remotely and anonymously gain Super User (root) privileges on a server running a Samba server.</I><BR><BR><I>This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a inclusive. This is a serious problem and all sites should either upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139 and 445. Advice created by Andrew Tridgell, the leader of the Samba Team, on how to protect an unpatched Samba server is given at the end of this section.</I><BR><BR><I>The SMB/CIFS protocol implemented by Samba is vulnerable to many attacks, even without specific security holes. The TCP ports 139 and the new port 445 (used by Win2k and the Samba 3.0 alpha code in particular) should never be exposed to untrusted networks.</I></P></UL><A name=impact>
<H3>II. Impact</H3></A>A remote attacker may be able to execute arbitrary code with the privileges of the Super User, typically root. <A name=solution>
<H3>III. Solution</H3></A><A href="http://www.samba.org/samba/ftp/"><FONT color=#0000ff>Upgrade</FONT></A> to Samba version 2.2.8.
<P>The "Protecting an unpatched Samba server" section of the Samba bulletin discusses several work arounds for unpatched servers. <A name=systems>
<H3>Systems Affected</H3></A>
<TABLE>
<TBODY>
<TR>
<TH align=left>Vendor</TH>
<TH align=left>Status</TH>
<TH>Date Updated</TH></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/JARL-5KQPB5">Apple Computer Inc.</A></TD>
<TD>Vulnerable</TD>
<TD>17-Mar-2003</TD></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/JARL-5KQR5S">Conectiva</A></TD>
<TD>Vulnerable</TD>
<TD>17-Mar-2003</TD></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/JARL-5KQR74">Debian</A></TD>
<TD>Vulnerable</TD>
<TD>17-Mar-2003</TD></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/JARL-5KQR3Z">Gentoo Linux</A></TD>
<TD>Vulnerable</TD>
<TD>17-Mar-2003</TD></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/JARL-5KQRRY">IBM</A></TD>
<TD>Vulnerable</TD>
<TD>17-Mar-2003</TD></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/JARL-5KQPL6">Ingrian</A></TD>
<TD>Not Vulnerable</TD>
<TD>17-Mar-2003</TD></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/JARL-5KQTCX">MandrakeSoft</A></TD>
<TD>Vulnerable</TD>
<TD>17-Mar-2003</TD></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/JARL-5KQQ3U">MontaVista Software</A></TD>
<TD>Vulnerable</TD>
<TD>17-Mar-2003</TD></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/JARL-5KQKLN">Samba Team</A></TD>
<TD>Vulnerable</TD>
<TD>17-Mar-2003</TD></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/JARL-5KQTQ7">SGI</A></TD>
<TD>Unknown</TD>
<TD>17-Mar-2003</TD></TR>
<TR>
<TD><A href="http://www.kb.cert.org/vuls/id/JARL-5KQQ5P">SuSE Inc.</A></TD>
<TD>Vulnerable</TD>
<TD>17-Mar-2003</TD></TR></TBODY></TABLE><A name=references>
<H3>References</H3></A><BR><BR><A href="http://www.samba.org/samba/whatsnew/samba-2.2.8.html">http://www.samba.org/samba/whatsnew/samba-2.2.8.html</A> <A name=credit>
<H3>Credit</H3></A>
<P>Thanks to Sebastian Krahmer for reporting this vulnerability.
<P>This document was written by Jason A Rafail. <A name=other>
<H3>Other Information</H3></A>
<TABLE>
<TBODY>
<TR>
<TD align=right>Date Public</TD>
<TD>03/16/2003</TD></TR>
<TR>
<TD align=right>Date First Published</TD>
<TD>03/17/2003 10:01:25 AM</TD></TR>
<TR>
<TD align=right>Date Last Updated</TD>
<TD>03/17/2003</TD></TR>
<TR>
<TD align=right>CERT Advisory</TD>
<TD> </TD></TR>
<TR>
<TD align=right>CVE Name</TD>
<TD> </TD></TR>
<TR>
<TD align=right>Metric</TD>
<TD>23.63</TD></TR>
<TR>
<TD align=right>Document Revision</TD>
<TD>5</TD></TR></TBODY></TABLE>
<P> </P>
<P> </P>
<P> </P>
<P><A href="http://www.kb.cert.org/vuls/id/298233">http://www.kb.cert.org/vuls/id/298233</A></P><p><br><hr size=1><b><a href="http://br.busca.yahoo.com/">Busca Yahoo! </a></b><br>
O serviço de busca mais completo da Internet. O que você pensar o Yahoo! encontra.