-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I'm not a security team member ( I'm not sure that exist this
'security team' :D ) but I try :D

- ------------------------------------------------------------
Arch Linux Security Warning        ALSW 2007-#1
- ------------------------------------------------------------

Name:      Samba
Date:      05/02/2007
Severity:  2
Warning #: 2007-#1

- ------------------------------------------------------------

Product Background
===================
Samba is an Open Source/Free Software suite that has, since 1992,
provided file and print services to all manner of SMB/CIFS clients,
including the numerous versions of Microsoft Windows operating systems.


Problem Background
===================

CVE-2007-0452: smbd in Samba 3.0.6 through 3.0.23d allows remote
authenticated users
to cause a denial of service (memory and CPU exhaustion) by renaming a
file in a way that prevents a request from being removed from the
deferred open queue, which triggers an infinite loop.


CVE-2007-0453: Buffer overflow in the nss_winbind.so.1 library in
Samba 3.0.21
through 3.0.23d, as used in the winbindd daemon on Solaris, allows
attackers to execute arbitrary code via the (1) gethostbyname and (2)
getipnodebyname functions.


CVE-2007-0454: Format string vulnerability in the afsacl.so VFS module
in Samba 3.0.6
through 3.0.23d allows context-dependent attackers to execute
arbitrary code via format string specifiers in a filename on an AFS
file system, which is not properly handled during Windows ACL mapping.


Problem Packages
===================
- ------------------------------------------------------------------
Package       |   Repo    |   Group    |   Unsafe   |    Safe    |
- ------------------------------------------------------------------
  samba           Current    Network    < 3.0.23-D-3   >= 3.0.24

Package Fix
===================
Rebuild package with this PKGBUILD in -current, but change version to
3.0.24. You can find source at
http://samba.org/samba/ftp/samba-3.0.24.tar.gz


Reference(s)
===================

    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0453
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0454



Contact
===================
JJDaNiMoTh (jjdanimoth AT gmail DOT com)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFFzKlqcJj0HNhER0MRAoeAAKCSwI6X+5rCHDdv/q+Rbsf+E5FGnwCglXpx
VGSVx9auggyCb0Gi+OOdG0I=
=Uolb
-----END PGP SIGNATURE-----


_______________________________________________
arch mailing list
arch@archlinux.org
http://www.archlinux.org/mailman/listinfo/arch

Reply via email to