-----BEGIN PGP SIGNED MESSAGE-----
AUSCERT External Security Bulletin Redistribution
ESB-2004.0117 -- The Samba Team
Samba 3.0.2 Security Bug-Fixes
11 February 2004
AusCERT Security Bulletin Summary
Product: Samba 3.0.x
Publisher: The Samba Team
Impact: Increased Privileges
Access Privileged Data
Access Required: Remote
CVE Names: CAN-2004-0082
- --------------------------BEGIN INCLUDED TEXT--------------------
- -----BEGIN PGP SIGNED MESSAGE-----
Here's another holiday release in time to be wrapped up for
This is the latest stable release of Samba. This is the version
that all production Samba servers should be running for all
It has been confirmed that previous versions of Samba 3.0 are
susceptible to a password initialization bug that could grant
an attacker unauthorized access to a user account created by
the mksmbpasswd.sh shell script.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2004-0082 to this issue.
Samba administrators not wishing to upgrade to the current
version should download the 3.0.2 release, build the pdbedit
tool, and run
~ root# pdbedit-3.0.2 --force-initialized-passwords
This will disable all accounts not possessing a valid password
(e.g. the password field has been set a string of X's).
Samba servers running 3.0.2 are not vulnerable to this bug
regardless of whether or not pdbedit has been used to sanitize
the passdb backend.
Additionally, some of the more visible bugs in 3.0.1 addressed
in the 3.0.2 release include:
~ o Joining a Samba domain from Pre-SP2 Windows 2000 clients.
~ o Logging onto a Samba domain from Windows XP clients.
~ o Problems with the %U and %u smb.conf variables in relation
~ to Windows 9x/ME clients.
~ o Kerberos failures due to an invalid in memory keytab
~ detection test.
~ o Updates to the ntlm_auth tool.
~ o Fixes for various SMB signing errors.
~ o Better separation of WINS and DNS queries for domain
~ o Issues with nss_winbind FreeBSD and Solaris.
~ o Several crash bugs in smbd and winbindd.
~ o Output formatting fixes for smbclient for better
~ compatibility with scripts based on the 2.2 version.
The source code can be downloaded from :
The uncompressed tarball and patch file have been signed
using GnuPG. The Samba public key is available at
Binary packages are available at
A simplified version of the CVS log of updates since 3.0.1
can be found in the the download directory under the name
ChangeLog-3.0.1-3.0.2. The release notes are also available
As always, all bugs (https://bugzilla.samba.org/) are our
~ The Samba Team
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to firstname.lastname@example.org
and we will forward your request to the appropriate person.
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
If you believe that your computer system has been compromised or attacked in
any way, we encourage you to let us know by completing the secure National IT
Incident Reporting Form at:
Internet Email: email@example.com
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business
hours which are GMT+10:00 (AEST). On call after hours
for member emergencies only.
-----BEGIN PGP SIGNATURE-----
-----END PGP SIGNATURE-----