Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2004.0117 -- The Samba Team Samba 3.0.2 Security Bug-Fixes 11 February 2004 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Samba 3.0.x Publisher: The Samba Team Impact: Increased Privileges Access Privileged Data Access Required: Remote CVE Names: CAN-2004-0082 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Here's another holiday release in time to be wrapped up for Valentine's Day. This is the latest stable release of Samba. This is the version that all production Samba servers should be running for all current bug-fixes. It has been confirmed that previous versions of Samba 3.0 are susceptible to a password initialization bug that could grant an attacker unauthorized access to a user account created by the mksmbpasswd.sh shell script. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0082 to this issue. Samba administrators not wishing to upgrade to the current version should download the 3.0.2 release, build the pdbedit tool, and run ~ root# pdbedit-3.0.2 --force-initialized-passwords This will disable all accounts not possessing a valid password (e.g. the password field has been set a string of X's). Samba servers running 3.0.2 are not vulnerable to this bug regardless of whether or not pdbedit has been used to sanitize the passdb backend. Additionally, some of the more visible bugs in 3.0.1 addressed in the 3.0.2 release include: ~ o Joining a Samba domain from Pre-SP2 Windows 2000 clients. ~ o Logging onto a Samba domain from Windows XP clients. ~ o Problems with the %U and %u smb.conf variables in relation ~ to Windows 9x/ME clients. ~ o Kerberos failures due to an invalid in memory keytab ~ detection test. ~ o Updates to the ntlm_auth tool. ~ o Fixes for various SMB signing errors. ~ o Better separation of WINS and DNS queries for domain ~ controllers. ~ o Issues with nss_winbind FreeBSD and Solaris. ~ o Several crash bugs in smbd and winbindd. ~ o Output formatting fixes for smbclient for better ~ compatibility with scripts based on the 2.2 version. The source code can be downloaded from : ~ http://download.samba.org/samba/ftp/ The uncompressed tarball and patch file have been signed using GnuPG. The Samba public key is available at ~ http://download.samba.org/samba/ftp/samba-pubkey.asc Binary packages are available at ~ http://download.samba.org/samba/ftp/Binary_Packages/ A simplified version of the CVS log of updates since 3.0.1 can be found in the the download directory under the name ChangeLog-3.0.1-3.0.2. The release notes are also available on-line at ~ http://www.samba.org/samba/whatsnew/samba-3.0.2.html As always, all bugs (https://bugzilla.samba.org/) are our responsibility. ~ --Enjoy ~ The Samba Team - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.1 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFAJ6PbIR7qMdg1EfYRAgUPAJ9CQ6KizLsyCzoR67+FL2X6VbFyfgCgjd2Q /WQLrFSqcPnokVOweZqcJAQ= =G/8i - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQCmPHih9+71yA2DNAQH9JQP+IyeWLvIUJ8uw+jVp8hPRgLLhH4J6fv0K rk7rXZOfgl6cAGHyggmzzKzkr9MgJ1GB7jCcP7HTKotg16wN2oooovxAqcrwh2Kq RX/+8OxdAO3Uf84j6xWwYGmwbPKTbmU8nxAHwmqncHKq5JmzEKKqcKEffypY7zxG J3R67D91i+A= =W9de -----END PGP SIGNATURE-----