copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
Search this site

On this site

 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login


ESB-2009.1412 - [Debian] samba: Multiple vulnerabilities

Date: 14 October 2009
References: ESB-2009.1361  ESB-2009.1546.2  ESB-2009.1546  

Click here for printable version
Click here for PGP verifiable version
Hash: SHA1

             AUSCERT External Security Bulletin Redistribution

              New samba packages fix several vulnerabilities
                              14 October 2009


        AusCERT Security Bulletin Summary

Product:           samba
Publisher:         Debian
Operating System:  Debian GNU/Linux 5
Impact/Access:     Access Confidential Data -- Existing Account      
                   Unauthorised Access      -- Existing Account      
                   Denial of Service        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2009-2948 CVE-2009-2906 CVE-2009-2813

Reference:         ESB-2009.1361

Original Bulletin:

- --------------------------BEGIN INCLUDED TEXT--------------------

Hash: SHA1

- - --------------------------------------------------------------------------
Debian Security Advisory DSA-1908-1                                           Nico Golde
October 14th, 2009            
- - --------------------------------------------------------------------------

Package        : samba
Vulnerability  : several
Problem type   : local/remote
Debian-specific: no
Debian bug     : none
CVE ID         : CVE-2009-2948 CVE-2009-2906 CVE-2009-2813

Several vulnerabilities have been discovered in samba, an implementation of
the SMB/CIFS protocol for Unix systems, providing support for cross-platform
file and printer sharing with other operating systems and more.  The Common
Vulnerabilities and Exposures project identifies the following problems:

The mount.cifs utility is missing proper checks for file permissions when
used in verbose mode.  This allows local users to partly disclose the
content of arbitrary files by specifying the file as credentials file and
attempting to mount a samba share (CVE-2009-2948).

A reply to an oplock break notification which samba doesn't expect could
lead to the service getting stuck in an infinite loop.  An attacker
can use this to perform denial of service attacks via a specially crafted
SMB request (CVE-2009-2906).

A lack of error handling in case no home diretory was configured/specified
for the user could lead to file disclosure.  In case the automated [homes]
share is enabled or an explicit share is created with that username, samba
fails to enforce sharing restrictions which results in an attacker being
able to access the file system from the root directory (CVE-2009-2813).

For the oldstable distribution (etch), this problem will be fixed soon.

For the stable distribution (lenny), this problem has been fixed in
version 2:3.2.5-4lenny7.

For the testing distribution (squeeze), this problem will be fixed soon.

For the unstable distribution (sid), this problem has been fixed in
version 2:3.4.2-1.

We recommend that you upgrade your samba packages.

Upgrade instructions
- - --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- - --------------------------------

Debian (stable)
- - ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:
    Size/MD5 checksum:     1830 7cc3718e19bbad5aa7099889c6c503a5
    Size/MD5 checksum: 50276407 0f7539e09803ae60a2912e70adf1c747
    Size/MD5 checksum:   235342 836141a1924843383cc385e544c933e5

Architecture independent packages:
    Size/MD5 checksum:  7952438 630b57065388404b8a9fe3e9e111dc47
    Size/MD5 checksum:  6252326 cded2ecbaa3fd39bd215dbb4ec666d4c

alpha architecture (DEC Alpha)
    Size/MD5 checksum:  1945142 a6804ba408657cc4c89c80b0d6e4b8a4
    Size/MD5 checksum:  1078442 0bedbb5cdb5ca36f52d2e1d1a6015804
    Size/MD5 checksum:  3273896 082fdadedaf0234b97a8aefc1ef62d8a
    Size/MD5 checksum:  2572542 ed15d1a7aa9c065986a8e896d63479e2
    Size/MD5 checksum:  4830106 58ed5cd28d4c43d07195d013cf25553f
    Size/MD5 checksum:  1461944 71adea7a3b47b65f8df4f3dc5efc4422
    Size/MD5 checksum:    81488 d521efbda414cf6d4a588873442eb987
    Size/MD5 checksum:  5730522 cca571adc80b833e7d9c45d5dd7fa103
    Size/MD5 checksum:   637762 b526ea1ed9ca51d132a7685ec8320eea
    Size/MD5 checksum:  1333234 36e35a3c252fabcfd2ec0ba8407323ca
    Size/MD5 checksum:  3736262 9dc1a726efda21fa112ef2641c9b1f6a
    Size/MD5 checksum:  6953202 b3e8de8b127bcd1f5dda4db61ed44b20

amd64 architecture (AMD x86_64 (AMD64))
    Size/MD5 checksum:  3274278 b732915df239ea1a9fff196250d6d383
    Size/MD5 checksum:  1493684 460ed93756df58adfa57870d06c9aaff
    Size/MD5 checksum:   627686 70379a8e6ce3b5d6de6af6b895d30619
    Size/MD5 checksum:  3728204 ac7fb1f7d07628d0452d10e62b2d661d
    Size/MD5 checksum:  1083940 5ca50cf6abd792b51e501f846f782231
    Size/MD5 checksum:  5646144 09130baf353097710d6df8a6586875d7
    Size/MD5 checksum:  1953358 e7c3f85d21b94e62baf0bc5849d8a7ed
    Size/MD5 checksum:    80522 507bc24d176289793eadd28f4623e331
    Size/MD5 checksum:  1358910 6ec7ccedec85f92e175b99c6abfb76ba
    Size/MD5 checksum:  1995586 be70b626e522a6d10947717cc4dad784
    Size/MD5 checksum:  7007462 b3a959d7475adb2d8aefc1d590690744
    Size/MD5 checksum:  4775388 b2adb39f3d76b691a747126efd40452a

arm architecture (ARM)
    Size/MD5 checksum:   561128 0d9cc7d736f2ac3af0037fb0538885bb
    Size/MD5 checksum:  2398710 a2a88432efcb034fad0cfc36130938f6
    Size/MD5 checksum:  6177100 b465429510298d684d16f33d977ec1c3
    Size/MD5 checksum:  3353238 d7e4a1fb9ecb639471baa485dc629653
    Size/MD5 checksum:    79216 da72ebd5740459cd44c6d5735883f203
    Size/MD5 checksum:  4267492 62425ac8d76f5879b900622026883d94
    Size/MD5 checksum:  1315868 8b3019c57cfeeb28509ca96f7d0358fa
    Size/MD5 checksum:   972222 1197d9bb33cfb181d99f03102b751cbf
    Size/MD5 checksum:  5041464 6db94424b23399cf83de0ae1968efba0
    Size/MD5 checksum:  1203924 f8a743cc5f4afb87f8b9cb883252c6f2
    Size/MD5 checksum:  1817072 72fddd524748b9e9206c135e81c698dc
    Size/MD5 checksum:  2892294 b43b907010b9373ec7957a570d9a80ec

armel architecture (ARM EABI)
    Size/MD5 checksum:  2910452 fd7f3ad0731784dccdc5b3b467513469
    Size/MD5 checksum:  6214560 94dff8a518547e92fb165c02dae9baec
    Size/MD5 checksum:  5070850 b4a9ac34be34928672ce800c899ac042
    Size/MD5 checksum:   981922 ae00524832d05f9aa8c06686c9e4e461
    Size/MD5 checksum:  1323868 be4570e7c8720bf0c756b4eac3cd3fe0
    Size/MD5 checksum:  3372252 012baecc35e1becc8a07d81adc262d65
    Size/MD5 checksum:  4294422 0c6add94f7e453817388fa9e529b82bd
    Size/MD5 checksum:  2424800 db72d33ac4229f163053c1f4ea18480e
    Size/MD5 checksum:    78816 d0ac45bb3404ac4fa9972bf47ec91cac
    Size/MD5 checksum:  1823568 48f417418296b035f611572d4504ffbd
    Size/MD5 checksum:  1210432 d58cf1719fc208e76cec7c28cb594da7
    Size/MD5 checksum:   564066 43f4da7801d6e972fae31ce287ded998

hppa architecture (HP PA RISC)
    Size/MD5 checksum:  2067740 1f3465310bfa420ca5d3dca47fb61876
    Size/MD5 checksum:  6687014 bd2920b6f871c5cfc573454993b99bd3
    Size/MD5 checksum:  4653108 91139f0c545ded0f434912e577cc655b
    Size/MD5 checksum:  1375386 2f9657458e85625ffa4f762df7ca9a87
    Size/MD5 checksum:    80862 32248cce30e50a58171439955e8c1b31
    Size/MD5 checksum:  5501106 2c9166906405f03cb05d509b871ee48b
    Size/MD5 checksum:  3177446 f061d9d8f7e5276ff6f6bf98ecea456e
    Size/MD5 checksum:   631654 1dd17d4d9edc8fc60707db89643a8aea
    Size/MD5 checksum:  3610032 ea72fc29881895beab6c09e20dce4eb9
    Size/MD5 checksum:  1046340 b118ec013c5588b8baaea5d1b0e920a8
    Size/MD5 checksum:  2229186 b1f09642dd40089211dbaa22d9e234fd
    Size/MD5 checksum:  1412786 3ffb5d639b595a3af2d1661439f7559d

i386 architecture (Intel ia32)
    Size/MD5 checksum:   984354 610ff7af9bdec786dc66dfc71e6d906d
    Size/MD5 checksum:  2930762 16cc9438cc5a7bac68f842aaff01cb44
    Size/MD5 checksum:  6302570 8508f2837d10ed9e791690764c887482
    Size/MD5 checksum:  2081416 a97abc97a1ccbebc475cf94ab984fac0
    Size/MD5 checksum:   561714 b61348ec0f3adb19990550cab9b7e40b
    Size/MD5 checksum:  3405124 904fba778279f57af680c3a25d316c89
    Size/MD5 checksum:  4295250 e783fb6625c27e5d4dbdf0b5072345db
    Size/MD5 checksum:    78984 0a4c138021591e75544c95a70a79f5e4
    Size/MD5 checksum:  5067188 9b7a2c22ef8ebab7db2da88e77d61607
    Size/MD5 checksum:  1825116 d70821ed19cb8118f76529c844c967de
    Size/MD5 checksum:  1199768 f33cfc38a35e53f9a278279d10cb9296
    Size/MD5 checksum:  1349920 a34c0d26610af3d6a5e8c0c9e35f6acf

ia64 architecture (Intel ia64)
    Size/MD5 checksum:  4386438 ec0ed107b01d00462e6a4dd9fa914a6f
    Size/MD5 checksum:  5832230 d73c656dac14065b3a1f13201510eb20
    Size/MD5 checksum:  1724092 9b5c69cdc6911c755a8e6b12d048d1ba
    Size/MD5 checksum:    84004 bc0fe8f98f03b5d665810cb5ade516e9
    Size/MD5 checksum:   752072 c462e06b2ff50d6abbc6fa5ba6c14dba
    Size/MD5 checksum:  1561116 91986263af0fd80f2a8d220e626ea4e9
    Size/MD5 checksum:  8294752 bfea15cf71e6f3503e8601b7b7a51ff4
    Size/MD5 checksum:  1939328 a3d3f802ed54267a93a61eed49d48b7e
    Size/MD5 checksum:  2400926 961af2d58aeff2eb54b6316b56b0d71b
    Size/MD5 checksum:  1280080 63385632efbd6d173e452b75ac295e7d
    Size/MD5 checksum:  6933470 666a61b68183f3afc017cb3658d25049
    Size/MD5 checksum:  3915410 a7ae5b73317aff391dbfffe447ee8958

mips architecture (MIPS (Big Endian))
    Size/MD5 checksum:  2507514 c8d996cba28f6d76d187774f844b01aa
    Size/MD5 checksum:  4203042 d48c2d45cd762dc2bad73ca9c089d3c9
    Size/MD5 checksum:   572688 4c689c9090845e6784d96eafdd1d1dd5
    Size/MD5 checksum:  1205342 92c7d350a6958c60b719dc1bca25e23c
    Size/MD5 checksum:  3238756 9c2d7e67ffcb7f6f9010e2a4cf3e5e16
    Size/MD5 checksum:   942044 b994c97405ec4963b68189a0ba00067b
    Size/MD5 checksum:  4998666 1648dd4cfec7bc14cbd41320b44fbb16
    Size/MD5 checksum:  2809438 f4ad77583575756d14629fd98c8166f5
    Size/MD5 checksum:    79288 10a8cdeed703948d1dd5e836897558f1
    Size/MD5 checksum:  2182258 5183531629f1c99dd71f253832bab233
    Size/MD5 checksum:  5840974 cb82df1024f5c10770ac98afe89e48a3
    Size/MD5 checksum:  1093592 8e55a6342da60f19c3c95a55a1d90164

mipsel architecture (MIPS (Little Endian))
    Size/MD5 checksum:  2128338 f27eefe417a4831ed071ee2a34949e47
    Size/MD5 checksum:   569280 584e1b162cb0452b814d34aa618d9b85
    Size/MD5 checksum:    79204 69f192c04fa40eb5e2fc37c1cdb1b0ac
    Size/MD5 checksum:  5801134 d3791aacacfcadd4caf909dd9b62fe31
    Size/MD5 checksum:  1081720 b19e32963b224825b1f6335e28bc6d6b
    Size/MD5 checksum:  2792976 e3d2772a8cf2274a26190043d0c9694a
    Size/MD5 checksum:  2387806 e5f53727f8ccdca5bfb82efbd5601c7e
    Size/MD5 checksum:  4967334 3dfdbd6e944b31808bb38bbe3ee3fe35
    Size/MD5 checksum:  1196484 bc9d17cd36558e526efd2e3870f2b0e4
    Size/MD5 checksum:  3219234 d4615fd079aecae1ed4753c4449aea75
    Size/MD5 checksum:  4177874 10909deb34148f33c2a92ecb6cfd8c72
    Size/MD5 checksum:   936880 1e742c0aa5a77a995fa174a9b02913c4

powerpc architecture (PowerPC)
    Size/MD5 checksum:  2988566 40620c503ca952eeeb73bde777a14435
    Size/MD5 checksum:  6294542 feab7c9b74b13b06b6977d637623c728
    Size/MD5 checksum:  2079372 4886a2d8d7664280dae64605c891996b
    Size/MD5 checksum:  1712666 75b337ef8fb0e52f71cf2e9b18faa1d4
    Size/MD5 checksum:  3423452 da023922a04344c534ee88e0e0292900
    Size/MD5 checksum:  5187664 0ddd64379049fadd254da0045e04d307
    Size/MD5 checksum:   595048 b08157624bc5ebe37b5a2c343649bb83
    Size/MD5 checksum:  1333642 98613e2a5c876333295cc0aab31ad250
    Size/MD5 checksum:   989426 e1b15a1a53be2bd09010c1dd0eeddcf8
    Size/MD5 checksum:  1239864 1aafcfc867e23a3b84f58e29f5a4b163
    Size/MD5 checksum:  4403350 c2b90fc3fb94dcd324f9da7a38a7c878
    Size/MD5 checksum:    80476 3ac690ddd20c773e1437d21572c37a2e

s390 architecture (IBM S/390)
    Size/MD5 checksum:  2061206 694599e2dae140a04c53be168ebbf163
    Size/MD5 checksum:  1389672 25b0b8754be83bae0984de459f7cf319
    Size/MD5 checksum:   641924 989f56ac5c323f74b34512dcf48412a0
    Size/MD5 checksum:  1935682 032e63baf547b194e2af89da342be617
    Size/MD5 checksum:  1258028 5884f69e4c3fc4567c8f2392b4cae88d
    Size/MD5 checksum:  4740858 01348d4fe49f9f8b07eb98b77a447c4d
    Size/MD5 checksum:  1056846 85573ee68987c713bf2abf1c676bcd6a
    Size/MD5 checksum:  6706474 c2cd5c961d23f7ec513b2cb0efa469a8
    Size/MD5 checksum:  5647644 c123e43888dace888b100f4d61cef627
    Size/MD5 checksum:    80832 c96484d5c2588fb90a23df5869463554
    Size/MD5 checksum:  3204582 0254ff9259bae547b7d8673124473e19
    Size/MD5 checksum:  3650302 0716bdcda1c0b080e30fbc2b4af03e6b

sparc architecture (Sun SPARC/UltraSPARC)
    Size/MD5 checksum:  1202198 76ec9e4b183e72139b216321ef0dbc6f
    Size/MD5 checksum:   975366 ce9edebb6cdbbfce4ed44dc376960d3a
    Size/MD5 checksum:  4322338 398acf0f34e81b674ec8cf4149bf4534
    Size/MD5 checksum:  2924672 52a6813bc6e557daa5f2ec523942ebcc
    Size/MD5 checksum:  5116574 63e4f4faadf3223fdd904e546aab6a22
    Size/MD5 checksum:  3372416 73b1333d568d87529e8d3072ebd4c509
    Size/MD5 checksum:   581590 2dcac90d984a7b08083be093befa1472
    Size/MD5 checksum:  1303976 731b1a1f9a65e1ec887c0fbdfcc867d3
    Size/MD5 checksum:  1996180 13724133b88e237853164fedd89c356b
    Size/MD5 checksum:    79152 1ffe88781e928339aa16c594f9f224f0
    Size/MD5 checksum:  6172106 37c0d2de6d73127751cf1670ee468944
    Size/MD5 checksum:  2020578 f161d329079cb0df6cbc30ed97191e15

  These files will probably be moved into the stable distribution on
  its next update.

- - ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show <pkg>' and<pkg>
Version: GnuPG v1.4.9 (GNU/Linux)


- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

Australian Computer Emergency Response Team
The University of Queensland
Qld 4072

Internet Email:
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.