Executive Summary

Summary
Title Updated samba packages fix security issue
Informations
Name RHSA-2004:498 First vendor Publication 2004-10-04
Vendor RedHat Last vendor Modification 2004-10-04
Severity (Vendor) N/A Revision 01

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Updated samba packages that fix an input validation vulnerability are now available.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1 - i386, ia64 Red Hat Linux Advanced Workstation 2.1 - ia64 Red Hat Enterprise Linux ES version 2.1 - i386 Red Hat Enterprise Linux WS version 2.1 - i386

3. Problem description:

Samba provides file and printer sharing services to SMB/CIFS clients.

Karol Wiesek discovered an input validation issue in Samba prior to 3.0.6. An authenticated user could send a carefully crafted request to the Samba server, which would allow access to files outside of the configured file share. Note: Such files would have to be readable by the account used for the connection. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0815 to this issue.

This issue does not affect Red Hat Enterprise Linux 3 as a previous erratum updated to Samba 3.0.6 which is not vulnerable to this issue.

Users of Samba should upgrade to these updated packages, which contain an upgrade to Samba-2.2.12, which is not vulnerable to this issue.

4. Solution:

Before applying this update, make sure that all previously-released errata relevant to your system have been applied. Use Red Hat Network to download and update your packages. To launch the Red Hat Update Agent, use the following command:

up2date

For information on how to install packages manually, refer to the following Web page for the System Administration or Customization guide specific to your system:

http://www.redhat.com/docs/manuals/enterprise/

5. RPMs required:

Red Hat Enterprise Linux AS (Advanced Server) version 2.1:

SRPMS: ftp://updates.redhat.com/enterprise/2.1AS/en/os/SRPMS/samba-2.2.12-1.21as.src.rpm 5638ca35fd98e056325625939d88bdec samba-2.2.12-1.21as.src.rpm

i386: f909c3d1b407bdae8bae7f4dc32560b5 samba-2.2.12-1.21as.i386.rpm 544dcf709f2358a47638cff19ffb5e1c samba-client-2.2.12-1.21as.i386.rpm ce64c5805665d42152171c5fcd3fdaed samba-common-2.2.12-1.21as.i386.rpm 94c046ff0b138401cdc6bf8dc815be99 samba-swat-2.2.12-1.21as.i386.rpm

ia64: 16f29cec56990a46fdd3daa003331a06 samba-2.2.12-1.21as.ia64.rpm d105265899a4f71fc59aec11271d4383 samba-client-2.2.12-1.21as.ia64.rpm 4a95769d191cafae3de5e15f49a8a282 samba-common-2.2.12-1.21as.ia64.rpm fa9e8fd73015a9e8b7e0c998774681c9 samba-swat-2.2.12-1.21as.ia64.rpm

Red Hat Linux Advanced Workstation 2.1:

SRPMS: ftp://updates.redhat.com/enterprise/2.1AW/en/os/SRPMS/samba-2.2.12-1.21as.src.rpm 5638ca35fd98e056325625939d88bdec samba-2.2.12-1.21as.src.rpm

ia64: 16f29cec56990a46fdd3daa003331a06 samba-2.2.12-1.21as.ia64.rpm d105265899a4f71fc59aec11271d4383 samba-client-2.2.12-1.21as.ia64.rpm 4a95769d191cafae3de5e15f49a8a282 samba-common-2.2.12-1.21as.ia64.rpm fa9e8fd73015a9e8b7e0c998774681c9 samba-swat-2.2.12-1.21as.ia64.rpm

Red Hat Enterprise Linux ES version 2.1:

SRPMS: ftp://updates.redhat.com/enterprise/2.1ES/en/os/SRPMS/samba-2.2.12-1.21as.src.rpm 5638ca35fd98e056325625939d88bdec samba-2.2.12-1.21as.src.rpm

i386: f909c3d1b407bdae8bae7f4dc32560b5 samba-2.2.12-1.21as.i386.rpm 544dcf709f2358a47638cff19ffb5e1c samba-client-2.2.12-1.21as.i386.rpm ce64c5805665d42152171c5fcd3fdaed samba-common-2.2.12-1.21as.i386.rpm 94c046ff0b138401cdc6bf8dc815be99 samba-swat-2.2.12-1.21as.i386.rpm

Red Hat Enterprise Linux WS version 2.1:

SRPMS: ftp://updates.redhat.com/enterprise/2.1WS/en/os/SRPMS/samba-2.2.12-1.21as.src.rpm 5638ca35fd98e056325625939d88bdec samba-2.2.12-1.21as.src.rpm

i386: f909c3d1b407bdae8bae7f4dc32560b5 samba-2.2.12-1.21as.i386.rpm 544dcf709f2358a47638cff19ffb5e1c samba-client-2.2.12-1.21as.i386.rpm ce64c5805665d42152171c5fcd3fdaed samba-common-2.2.12-1.21as.i386.rpm 94c046ff0b138401cdc6bf8dc815be99 samba-swat-2.2.12-1.21as.i386.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://www.redhat.com/security/team/key.html#package

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2004-498.html

CWE : Common Weakness Enumeration

% Id Name

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 20

OpenVAS Exploits

Date Description
2009-05-05 Name : HP-UX Update for CIFS Samba Server HPSBUX01086
File : nvt/gb_hp_ux_HPSBUX01086.nasl
2008-09-04 Name : FreeBSD Ports: samba
File : nvt/freebsd_samba2.nasl
2008-01-17 Name : Debian Security Advisory DSA 600-1 (samba)
File : nvt/deb_600_1.nasl
2005-11-03 Name : Samba Remote Arbitrary File Access
File : nvt/samba_arbitrary_file_access.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
10990 HP CIFS Server Arbitrary File Access

The HP CIFS Server contains a flaw that allows a remote attacker to read or write files outside of the shared directory path. The issue is due to the program not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "unix_convert()" and "check_name()" variables when converting DOS path names to filenames which are valid on the server filesystem.
10464 Samba MS-DOS Path Request Arbitrary File Retrieval

Samba contains a flaw that allows a remote attacker to gain access to files outside of the share path under the privileges of the user. With a specifically crafted request, an attacker could potentially access files outside the share's root. The issue is due to the unix_convert() and check_name() functions not properly sanitizing user input supplied via the GET, PUT and DIR commands. Samba treats the resulting input as an absolute path rather than relative path to the share.

Snort® IPS/IDS

Date Description
2014-01-10 Samba arbitrary file access exploit attempt
RuleID : 15983 - Revision : 8 - Type : SERVER-SAMBA

Nessus® Vulnerability Scanner

Date Description
2005-07-13 Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_de16b056132e11d9bc4a000c41e2cdad.nasl - Type : ACT_GATHER_INFO
2004-11-10 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-600.nasl - Type : ACT_GATHER_INFO
2004-10-06 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2004-498.nasl - Type : ACT_GATHER_INFO
2004-10-05 Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2004_035.nasl - Type : ACT_GATHER_INFO
2004-10-02 Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2004-104.nasl - Type : ACT_GATHER_INFO
2004-09-30 Name : The remote file server allows access to arbitrary files.
File : samba_arbitrary_file_access.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2014-02-17 11:48:42
  • Multiple Updates