______________________________________________________________________________

                        SuSE Security Announcement

        Package:  samba 2.0.5 (and previous versions)
        Date:     Tue Aug 17 07:03:33 CEST 1999
        Affected: all Linux systems using samba <= 2.0.5

______________________________________________________________________________

Some security holes were discovered in the package mentioned above.
Please update as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).

Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.

Please note, that that we provide this information on as "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.

______________________________________________________________________________

1. Problem Description

    a) A setuid root installed smbmnt could lead to a security breach due to
       a race condition.
    b) The NetBIOS name server nmbd is vulnerable to a denial-of-service attack.
    c) The message service of the SMB-/CIFS-server has got a buffer overflow.

2. Impact

    a) Users could mount arbitrary points in the filesystem, if smbmnt is
       setuid root. (smbmnt isn't installed setuid by default)
    b) If the DoS attack was triggered, the nmbd daemon uses up CPU resources.
    c) The buffer overflow is only exploitable, if the "message command"
       option is set in the smb.conf file. (these option isn't set by default)

3. Solution

    Install the updated package, which is available from our
    ftp server sine some weeks.

______________________________________________________________________________

Here is the md5 checksum of the fixed package, please verify these
before installing the new package:

        7cef0cbfcc8ca05b9cb96159bae80e6a  samba.rpm
        b2c1f3cf4562f98dbe3b2074e8c66ded  samba-2.0.5a-3.src.rpm
______________________________________________________________________________

You will find the update on our ftp-Server:

        ftp.suse.com/pub/suse/i386/update/6.1/n1/samba.rpm (i386, glibc)
        ftp.suse.com/pub/suse/i386/update/6.1/n1/samba-2.0.5a-0.src.rpm

Webpage for patches:
        http://www.suse.de/patches/index.html

or try the following web pages for a list of mirrors:

        http://www.suse.de/ftp.html
        
______________________________________________________________________________

Security hole in samba

December 8, 1999
a) A setuid root installed smbmnt could lead to a security breach due to a race condition. b) The NetBIOS name server nmbd is vulnerable to a denial-of-service atta...

Summary

______________________________________________________________________________

                        SuSE Security Announcement

        Package:  samba 2.0.5 (and previous versions)
        Date:     Tue Aug 17 07:03:33 CEST 1999
        Affected: all Linux systems using samba <= 2.0.5

______________________________________________________________________________

Some security holes were discovered in the package mentioned above.
Please update as soon as possible or disable the service if you are using
this software on your SuSE Linux installation(s).

Other Linux distributions or operating systems might be affected as
well, please contact your vendor for information about this issue.

Please note, that that we provide this information on as "as-is" basis only.
There is no warranty whatsoever and no liability for any direct, indirect or
incidental damage arising from this information or the installation of
the update package.

______________________________________________________________________________

1. Problem Description

    a) A setuid root installed smbmnt could lead to a security breach due to
       a race condition.
    b) The NetBIOS name server nmbd is vulnerable to a denial-of-service attack.
    c) The message service of the SMB-/CIFS-server has got a buffer overflow.

2. Impact

    a) Users could mount arbitrary points in the filesystem, if smbmnt is
       setuid root. (smbmnt isn't installed setuid by default)
    b) If the DoS attack was triggered, the nmbd daemon uses up CPU resources.
    c) The buffer overflow is only exploitable, if the "message command"
       option is set in the smb.conf file. (these option isn't set by default)

3. Solution

    Install the updated package, which is available from our
    ftp server sine some weeks.

______________________________________________________________________________

Here is the md5 checksum of the fixed package, please verify these
before installing the new package:

        7cef0cbfcc8ca05b9cb96159bae80e6a  samba.rpm
        b2c1f3cf4562f98dbe3b2074e8c66ded  samba-2.0.5a-3.src.rpm
______________________________________________________________________________

You will find the update on our ftp-Server:

        ftp.suse.com/pub/suse/i386/update/6.1/n1/samba.rpm (i386, glibc)
        ftp.suse.com/pub/suse/i386/update/6.1/n1/samba-2.0.5a-0.src.rpm

Webpage for patches:
        http://www.suse.de/patches/index.html

or try the following web pages for a list of mirrors:

        http://www.suse.de/ftp.html
        
______________________________________________________________________________

References

Severity

Related News