Jump to content

Advisories MDKSA-2007:224-1: Updated samba packages fix vulnerabilities


paul
 Share

Recommended Posts

The samba developers discovered that nmbd could be made to overrun a

buffer during the processing of GETDC logon server requests. If samba

is configured as a Primary or Backup Domain Controller, this could

be used by a remote attacker to send malicious logon requests and

possibly cause a denial of service (CVE-2007-4572).

 

As well, Alin Rad Pop of Secunia Research found that nmbd did not

properly check the length of netbios packets. If samba is configured

as a WINS server, this could be used by a remote attacker able to

send multiple crafted requests to nmbd, resulting in the execution

of arbitrary code with root privileges (CVE-2007-5398).

 

Update:

 

The patch that fixed CVE-2007-4572 introduced a regression that would

prevent shares from being mounted properly and would cause the remote

(patched) smbd to crash. This update contains another fix from

upstream to correct the problem.

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

×
×
  • Create New...