Date: 18 April 2001
References: ESB-2001.172 ESB-2001.199
Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2001.156 -- Debian Security Advisory DSA-048-1
samba symlink attacks
18 April 2001
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: samba
Vendor: Debian
Operating System: Debian GNU/Linux 2.2
Linux
Platform: alpha
arm
i386
m68k
powerpc
sparc
Impact: Overwrite Arbitrary Files
Access Required: Local
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
- - ------------------------------------------------------------------------
Debian Security Advisory DSA-048-1 security@debian.org
http://www.debian.org/security/ Wichert Akkerman
April 18, 2001
- - ------------------------------------------------------------------------
Package : samba
Problem type : symlink attack
Debian-specific: no
Marcus Meissner discovered that samba was not creating temporary
files safely in two places:
* when a remote user queried a printer queue samba would creates a
temporary file in which the queue data would be written. This was
doing using a predictable filename and insecurely, allowing a local
attacker to trick samba into overwriting arbitrary files.
* smbclient "more" and "mput" commands also creates temporary files
in /tmp insecurely.
Both problems have been fixed in version 2.0.7-3.2. and we recommand
that you upgrade your samba package immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
Debian GNU/Linux 2.2 alias potato
- - ---------------------------------
Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
Source archives:
http://security.debian.org/dists/stable/updates/main/source/samba_2.0.7-3.2.diff.gz
MD5 checksum: 82f8739acbd18c2ea8756ca705d17fef
http://security.debian.org/dists/stable/updates/main/source/samba_2.0.7-3.2.dsc
MD5 checksum: 9db59a582e19daf987c8a0ed967ca191
http://security.debian.org/dists/stable/updates/main/source/samba_2.0.7.orig.tar.gz
MD5 checksum: b5e61ea655d476072fd0365785fea2d0
Architecture indendent archives:
http://security.debian.org/dists/stable/updates/main/binary-all/samba-doc_2.0.7-3.2_all.deb
MD5 checksum: 5e141a7224ce79f11e9b2064437798ca
Alpha architecture:
http://security.debian.org/dists/stable/updates/main/binary-alpha/samba-common_2.0.7-3.2_alpha.deb
MD5 checksum: 6a2f7e7a57ab35886c8bfdfe3798d5ea
http://security.debian.org/dists/stable/updates/main/binary-alpha/samba_2.0.7-3.2_alpha.deb
MD5 checksum: 742bdfcd38f1601e9da31c45b0998222
http://security.debian.org/dists/stable/updates/main/binary-alpha/smbclient_2.0.7-3.2_alpha.deb
MD5 checksum: eee19cafe89c836727320d08056584e2
http://security.debian.org/dists/stable/updates/main/binary-alpha/smbfs_2.0.7-3.2_alpha.deb
MD5 checksum: edbe76558ce16b42267f9e0836787d49
http://security.debian.org/dists/stable/updates/main/binary-alpha/swat_2.0.7-3.2_alpha.deb
MD5 checksum: 7953a130bc363c1c7b62e87a1e0e7121
ARM architecture:
http://security.debian.org/dists/stable/updates/main/binary-arm/samba-common_2.0.7-3.2_arm.deb
MD5 checksum: 6217609b05ceb4a39bcd02abc3524a5d
http://security.debian.org/dists/stable/updates/main/binary-arm/samba_2.0.7-3.2_arm.deb
MD5 checksum: ca294748daf3e2e154801599c51ffd35
http://security.debian.org/dists/stable/updates/main/binary-arm/smbclient_2.0.7-3.2_arm.deb
MD5 checksum: cf095c92a9628ffbe2211b6a1c87d184
http://security.debian.org/dists/stable/updates/main/binary-arm/smbfs_2.0.7-3.2_arm.deb
MD5 checksum: 3403c99981c349ea0bf36f557f1e8067
http://security.debian.org/dists/stable/updates/main/binary-arm/swat_2.0.7-3.2_arm.deb
MD5 checksum: a03ee71fefd16b53a04a5a9046d5f419
Intel ia32 architecture:
http://security.debian.org/dists/stable/updates/main/binary-i386/samba-common_2.0.7-3.2_i386.deb
MD5 checksum: 28d1ca225b39dbba8e427c4a3ff4db5e
http://security.debian.org/dists/stable/updates/main/binary-i386/samba_2.0.7-3.2_i386.deb
MD5 checksum: 624e9fc767b45fcaee386e83def462b0
http://security.debian.org/dists/stable/updates/main/binary-i386/smbclient_2.0.7-3.2_i386.deb
MD5 checksum: ad4b5f2da854a7d4a7224cb8f87eb4bc
http://security.debian.org/dists/stable/updates/main/binary-i386/smbfs_2.0.7-3.2_i386.deb
MD5 checksum: 7d344d86f479417398a47c467b15202f
http://security.debian.org/dists/stable/updates/main/binary-i386/swat_2.0.7-3.2_i386.deb
MD5 checksum: c488d0e582b63a47743943c53a8b94ec
Motorola 680x0 architecture:
http://security.debian.org/dists/stable/updates/main/binary-m68k/samba-common_2.0.7-3.2_m68k.deb
MD5 checksum: bb80db7568a979598bb97ebe72734111
http://security.debian.org/dists/stable/updates/main/binary-m68k/samba_2.0.7-3.2_m68k.deb
MD5 checksum: ea048e0bebea6005ea137fae614ceb1e
http://security.debian.org/dists/stable/updates/main/binary-m68k/smbclient_2.0.7-3.2_m68k.deb
MD5 checksum: 41e467e2f5fa8c37ad590e791c4bb986
http://security.debian.org/dists/stable/updates/main/binary-m68k/smbfs_2.0.7-3.2_m68k.deb
MD5 checksum: 1a64849dde006f826008be44ee2a1fc6
http://security.debian.org/dists/stable/updates/main/binary-m68k/swat_2.0.7-3.2_m68k.deb
MD5 checksum: 0fad867c08bd94114d5e6d5b9cfc55df
PowerPC architecture:
http://security.debian.org/dists/stable/updates/main/binary-powerpc/samba-common_2.0.7-3.2_powerpc.deb
MD5 checksum: 1b14775f54e370e2c7fcd7adfa0a083f
http://security.debian.org/dists/stable/updates/main/binary-powerpc/samba_2.0.7-3.2_powerpc.deb
MD5 checksum: 4d8d1721a0d62179b3a15c9198e96974
http://security.debian.org/dists/stable/updates/main/binary-powerpc/smbclient_2.0.7-3.2_powerpc.deb
MD5 checksum: 3dd961b0b1e0665a3b963530d45ce61c
http://security.debian.org/dists/stable/updates/main/binary-powerpc/smbfs_2.0.7-3.2_powerpc.deb
MD5 checksum: 89cb67b2550f324435a7946ae9441eea
http://security.debian.org/dists/stable/updates/main/binary-powerpc/swat_2.0.7-3.2_powerpc.deb
MD5 checksum: f9bcaa966f37c1f4c244e4d2dfdda9b8
Sun Sparc architecture:
http://security.debian.org/dists/stable/updates/main/binary-sparc/samba-common_2.0.7-3.2_sparc.deb
MD5 checksum: 22623e59f94d4b9389f415bf551902ad
http://security.debian.org/dists/stable/updates/main/binary-sparc/samba_2.0.7-3.2_sparc.deb
MD5 checksum: 0a61c286bcff8265ffac42f9e16c2cfb
http://security.debian.org/dists/stable/updates/main/binary-sparc/smbclient_2.0.7-3.2_sparc.deb
MD5 checksum: a69169f02ef3fdede523f406c36cd12a
http://security.debian.org/dists/stable/updates/main/binary-sparc/smbfs_2.0.7-3.2_sparc.deb
MD5 checksum: 2aa6c4b0a0228e38427c09dec251b487
http://security.debian.org/dists/stable/updates/main/binary-sparc/swat_2.0.7-3.2_sparc.deb
MD5 checksum: 7f6971d7cc236fde6307a666852b5e1c
These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
- - --
- - ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv
iQB1AwUBOtzcZKjZR/ntlUftAQFEygMApMpcDQsNb4Dxpx4btCFKjKb3OoUNaad9
Jn6Nx8J1UnPXs47L8GebUewq9KNaC5wi0GMJGbV2EhJEkK91I6ElIDPetuekQi5a
5+2jLeN0Y4v+BkvJ73z5TTwlyV6SD4B8
=lGKB
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
http://www.auscert.org.au/Information/advisories.html
If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for emergencies.
-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key
iQCVAwUBOt3BRih9+71yA2DNAQHF4AP+K/U+Q5mFbAABNmZdSApmTz+wiYJhUcLV
R3MrtIsgQgF8ZkbiEN8DvulC/rrcn5jDv2cnERmzQ/FqEEKqJGz5N9Cv5NFrKzzS
5PiGqICu3zn99DZHZlgR9bCSXHldZWD8j3OrMFcaLkgvDn7o6hZPLpI6ApVNgmNL
yKJr0zZHGg0=
=Vhva
-----END PGP SIGNATURE-----
|