Executive Summary
Summary | |
---|---|
Title | Updated samba packages fix security issue |
Informations | |||
---|---|---|---|
Name | RHSA-2004:498 | First vendor Publication | 2004-10-04 |
Vendor | RedHat | Last vendor Modification | 2004-10-04 |
Severity (Vendor) | N/A | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated samba packages that fix an input validation vulnerability are now available. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386 3. Problem description: Samba provides file and printer sharing services to SMB/CIFS clients. Karol Wiesek discovered an input validation issue in Samba prior to 3.0.6. An authenticated user could send a carefully crafted request to the Samba server, which would allow access to files outside of the configured file share. Note: Such files would have to be readable by the account used for the connection. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0815 to this issue. This issue does not affect Red Hat Enterprise Linux 3 as a previous erratum updated to Samba 3.0.6 which is not vulnerable to this issue. Users of Samba should upgrade to these updated packages, which contain an upgrade to Samba-2.2.12, which is not vulnerable to this issue. 4. Solution: Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command: up2date For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system: http://www.redhat.com/docs/manuals/enterprise/ 5. RPMs required: Red Hat Enterprise Linux AS (Advanced Server) version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/samba-2.2.12-1.21as.src.rpm 5638ca35fd98e056325625939d88bdec samba-2.2.12-1.21as.src.rpm i386: f909c3d1b407bdae8bae7f4dc32560b5 samba-2.2.12-1.21as.i386.rpm 544dcf709f2358a47638cff19ffb5e1c samba-client-2.2.12-1.21as.i386.rpm ce64c5805665d42152171c5fcd3fdaed samba-common-2.2.12-1.21as.i386.rpm 94c046ff0b138401cdc6bf8dc815be99 samba-swat-2.2.12-1.21as.i386.rpm ia64: 16f29cec56990a46fdd3daa003331a06 samba-2.2.12-1.21as.ia64.rpm d105265899a4f71fc59aec11271d4383 samba-client-2.2.12-1.21as.ia64.rpm 4a95769d191cafae3de5e15f49a8a282 samba-common-2.2.12-1.21as.ia64.rpm fa9e8fd73015a9e8b7e0c998774681c9 samba-swat-2.2.12-1.21as.ia64.rpm Red Hat Linux Advanced Workstation 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/samba-2.2.12-1.21as.src.rpm 5638ca35fd98e056325625939d88bdec samba-2.2.12-1.21as.src.rpm ia64: 16f29cec56990a46fdd3daa003331a06 samba-2.2.12-1.21as.ia64.rpm d105265899a4f71fc59aec11271d4383 samba-client-2.2.12-1.21as.ia64.rpm 4a95769d191cafae3de5e15f49a8a282 samba-common-2.2.12-1.21as.ia64.rpm fa9e8fd73015a9e8b7e0c998774681c9 samba-swat-2.2.12-1.21as.ia64.rpm Red Hat Enterprise Linux ES version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/samba-2.2.12-1.21as.src.rpm 5638ca35fd98e056325625939d88bdec samba-2.2.12-1.21as.src.rpm i386: f909c3d1b407bdae8bae7f4dc32560b5 samba-2.2.12-1.21as.i386.rpm 544dcf709f2358a47638cff19ffb5e1c samba-client-2.2.12-1.21as.i386.rpm ce64c5805665d42152171c5fcd3fdaed samba-common-2.2.12-1.21as.i386.rpm 94c046ff0b138401cdc6bf8dc815be99 samba-swat-2.2.12-1.21as.i386.rpm Red Hat Enterprise Linux WS version 2.1: SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/samba-2.2.12-1.21as.src.rpm 5638ca35fd98e056325625939d88bdec samba-2.2.12-1.21as.src.rpm i386: f909c3d1b407bdae8bae7f4dc32560b5 samba-2.2.12-1.21as.i386.rpm 544dcf709f2358a47638cff19ffb5e1c samba-client-2.2.12-1.21as.i386.rpm ce64c5805665d42152171c5fcd3fdaed samba-common-2.2.12-1.21as.i386.rpm 94c046ff0b138401cdc6bf8dc815be99 samba-swat-2.2.12-1.21as.i386.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2004-498.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-05-05 | Name : HP-UX Update for CIFS Samba Server HPSBUX01086 File : nvt/gb_hp_ux_HPSBUX01086.nasl |
2008-09-04 | Name : FreeBSD Ports: samba File : nvt/freebsd_samba2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 600-1 (samba) File : nvt/deb_600_1.nasl |
2005-11-03 | Name : Samba Remote Arbitrary File Access File : nvt/samba_arbitrary_file_access.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
10990 | HP CIFS Server Arbitrary File Access The HP CIFS Server contains a flaw that allows a remote attacker to read or write files outside of the shared directory path. The issue is due to the program not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "unix_convert()" and "check_name()" variables when converting DOS path names to filenames which are valid on the server filesystem. |
10464 | Samba MS-DOS Path Request Arbitrary File Retrieval Samba contains a flaw that allows a remote attacker to gain access to files outside of the share path under the privileges of the user. With a specifically crafted request, an attacker could potentially access files outside the share's root. The issue is due to the unix_convert() and check_name() functions not properly sanitizing user input supplied via the GET, PUT and DIR commands. Samba treats the resulting input as an absolute path rather than relative path to the share. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Samba arbitrary file access exploit attempt RuleID : 15983 - Revision : 8 - Type : SERVER-SAMBA |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-07-13 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_de16b056132e11d9bc4a000c41e2cdad.nasl - Type : ACT_GATHER_INFO |
2004-11-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-600.nasl - Type : ACT_GATHER_INFO |
2004-10-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2004-498.nasl - Type : ACT_GATHER_INFO |
2004-10-05 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2004_035.nasl - Type : ACT_GATHER_INFO |
2004-10-02 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2004-104.nasl - Type : ACT_GATHER_INFO |
2004-09-30 | Name : The remote file server allows access to arbitrary files. File : samba_arbitrary_file_access.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:48:42 |
|