From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-200711-29.xml | 77 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 77 insertions(+) create mode 100644 metadata/glsa/glsa-200711-29.xml (limited to 'metadata/glsa/glsa-200711-29.xml') diff --git a/metadata/glsa/glsa-200711-29.xml b/metadata/glsa/glsa-200711-29.xml new file mode 100644 index 000000000000..4f918b802e44 --- /dev/null +++ b/metadata/glsa/glsa-200711-29.xml @@ -0,0 +1,77 @@ + + + + Samba: Execution of arbitrary code + + Samba contains two buffer overflow vulnerabilities potentially resulting in + the execution of arbitrary code. + + samba + 2007-11-20 + 2007-12-05: 03 + 197519 + remote + + + 3.0.27a + 3.0.27a + + + +

+ Samba is a suite of SMB and CIFS client/server programs for UNIX. +

+
+ +

+ Two vulnerabilities have been reported in nmbd. Alin Rad Pop (Secunia + Research) discovered a boundary checking error in the + reply_netbios_packet() function which could lead to a stack-based + buffer overflow (CVE-2007-5398). The Samba developers discovered a + boundary error when processing GETDC logon requests also leading to a + buffer overflow (CVE-2007-4572). +

+
+ +

+ To exploit the first vulnerability, a remote unauthenticated attacker + could send specially crafted WINS "Name Registration" requests followed + by a WINS "Name Query" request. This might lead to execution of + arbitrary code with elevated privileges. Note that this vulnerability + is exploitable only when WINS server support is enabled in Samba. The + second vulnerability could be exploited by sending specially crafted + "GETDC" mailslot requests, but requires Samba to be configured as a + Primary or Backup Domain Controller. It is not believed the be + exploitable to execute arbitrary code. +

+
+ +

+ To work around the first vulnerability, disable WINS support in Samba + by setting "wins support = no" in the "global" section of your + smb.conf and restart Samba. +

+
+ +

+ All Samba users should upgrade to the latest version: +

+ + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.27a" +

+ The first vulnerability (CVE-2007-5398) was already fixed in Samba + 3.0.26a-r2. +

+
+ + CVE-2007-4572 + CVE-2007-5398 + + + rbu + + + p-y + +
-- cgit v1.2.3