The branch, master has been updated via efcd238 Add security advisory for CVE-2012-1182. via 1031806 Announce Samba 3.6.4, 3.5.14 and 3.4.16. from 96e7213 Added Ira Cooper to Samba Team contacts.
http://gitweb.samba.org/?p=samba-web.git;a=shortlog;h=master - Log ----------------------------------------------------------------- commit efcd238e39f03a89adebfc5a49e4df46753c4d62 Author: Karolin Seeger <ksee...@samba.org> Date: Tue Apr 10 10:52:50 2012 +0200 Add security advisory for CVE-2012-1182. Karolin commit 10318063237d463ba4800fe0e6d50455a15a7eb5 Author: Karolin Seeger <ksee...@samba.org> Date: Mon Apr 9 20:55:02 2012 +0200 Announce Samba 3.6.4, 3.5.14 and 3.4.16. Karolin ----------------------------------------------------------------------- Summary of changes: generated_news/latest_10_bodies.html | 38 ++++++++---- generated_news/latest_10_headlines.html | 4 +- generated_news/latest_2_bodies.html | 36 ++++++++--- history/header_history.html | 3 + history/samba-3.4.16.html | 41 +++++++++++++ history/samba-3.5.14.html | 40 ++++++++++++ history/samba-3.6.4.html | 40 ++++++++++++ history/security.html | 20 ++++++ latest_stable_release.html | 6 +- security/CVE-2012-1182.html | 99 +++++++++++++++++++++++++++++++ 10 files changed, 302 insertions(+), 25 deletions(-) create mode 100755 history/samba-3.4.16.html create mode 100755 history/samba-3.5.14.html create mode 100755 history/samba-3.6.4.html create mode 100644 security/CVE-2012-1182.html Changeset truncated at 500 lines: diff --git a/generated_news/latest_10_bodies.html b/generated_news/latest_10_bodies.html index 667a083..47c51cf 100644 --- a/generated_news/latest_10_bodies.html +++ b/generated_news/latest_10_bodies.html @@ -1,3 +1,30 @@ + <h5><a name="3.6.4">10 April 2012</a></h5> + <p class="headline">Samba 3.6.4, 3.5.14 and 3.4.16 <b>Security Releases</b> Available for Download</p> + <p>These are security releases in order to address <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-CVE-2012-1182">CVE-2012-1182 ("root" credential remote code execution)</a>.</p> + +<p>The uncompressed tarballs and patch files have been signed +using GnuPG (ID 6568B7EA).</p> +<p> +The source code can be downloaded here: +<li><a href="http://samba.org/samba/ftp/stable/samba-3.6.4.tar.gz">download Samba 3.6.4</a>,</li> +<li><a href="http://samba.org/samba/ftp/stable/samba-3.5.14.tar.gz">download Samba 3.5.14</a>,</li> +<li><a href="http://samba.org/samba/ftp/stable/samba-3.4.16.tar.gz">download Samba 3.4.16</a>.</li> +</p> + +<p> +Patches against the parents are also available: +<li><a href="http://samba.org/samba/ftp/patches/patch-3.6.3-3.6.4.diffs.gz">patch Samba 3.6.3/3.6.3</a>,</li> +<li><a href="http://samba.org/samba/ftp/patches/patch-3.5.13-3.5.14.diffs.gz">patch Samba 3.5.13/3.5.14</a>,</li> +<li><a href="http://samba.org/samba/ftp/patches/patch-3.4.15-3.4.16.diffs.gz">patch Samba 3.4.15/3.4.16</a>.</li> +</p> + +<p> +Please see the release notes for more info: +<li><a href="http://samba.org/samba/history/samba-3.6.4.html">release notes Samba 3.6.4</a>,</li> +<li><a href="http://samba.org/samba/history/samba-3.5.14.html">release notes Samba 3.5.14</a>,</li> +<li><a href="http://samba.org/samba/history/samba-3.4.16.html">release notes Samba 3.4.16</a>.</li> +</p> + <h5><a name="SMB2.2 Interop Event">20 March 2012</a></h5> <p class="headline">Report: Microsoft SMB2.2 Interop Event</p> <p>A few Samba Team members recently accepted an invitation by Microsoft @@ -74,14 +101,3 @@ now</a>. A <a href="http://samba.org/samba/ftp/patches/patch-3.5.11-3.5.12.diffs using GnuPG (ID 6568B7EA). The source code can be <a href="http://samba.org/samba/ftp/stable/samba-3.6.1.tar.gz">downloaded now</a>. A <a href="http://samba.org/samba/ftp/patches/patch-3.6.0-3.6.1.diffs.gz">patch against Samba 3.6.0</a> is also available. See <a href="http://samba.org/samba/history/samba-3.6.1.html">the release notes for more info</a>.</p> - - <h5><a name="2011-snia-sdc-report">26 September 2011</a></h5> - <p class="headline">2011 SNIA SDC Report</p> - <p>Many Samba developers attended the recent -<a href=http://www.storagedeveloper.org/>Storage Developers Conference</a> -including our very own <a href=http://ubiqx.com/>Chris Hertel</a>. He was -nice enough to write a comprehensive summary with some focus on -<strong>SMB2.2</strong>.</p> - - <p>Are you curious about the -<a href=/samba/news/developers/2011-snia-sdc-report.html>2011 SNIA SDC Report</a>?</p> diff --git a/generated_news/latest_10_headlines.html b/generated_news/latest_10_headlines.html index e9af10b..eca78dd 100644 --- a/generated_news/latest_10_headlines.html +++ b/generated_news/latest_10_headlines.html @@ -1,4 +1,6 @@ <ul> + <li> 10 April 2012 <a href="#3.6.4">Samba 3.6.4</a>, <a href="#3.5.14">3.5.14</a> and <a href="#3.4.16">3.4.16</a> <b>Security Releases</b> Available for Download.</li> + <li> 20 March 2012 <a href="/samba/news/developers/obnox-samba-team-visits-microsoft-for-smb2-2-interop-event.html">Report: Microsoft SMB2.2 Interop Event</a></li> <li> 12 March 2012 <a href="#3.5.13">Samba 3.5.13 Available for Download</a></li> @@ -16,6 +18,4 @@ <li> 26 October 2011 <a href="#3.5.12">Samba 3.5.12 Available for Download</a></li> <li> 20 October 2011 <a href="#3.6.1">Samba 3.6.1 Available for Download</a></li> - - <li> 26 September 2011 <a href="/samba/news/developers/2011-snia-sdc-report.html">2011 SNIA SDC Report</a></li> </ul> diff --git a/generated_news/latest_2_bodies.html b/generated_news/latest_2_bodies.html index 3a9ba50..f0dbdc7 100644 --- a/generated_news/latest_2_bodies.html +++ b/generated_news/latest_2_bodies.html @@ -1,3 +1,30 @@ + <h5><a name="3.6.4">10 April 2012</a></h5> + <p class="headline">Samba 3.6.4, 3.5.14 and 3.4.16 <b>Security Releases</b> Available for Download</p> + <p>These are security releases in order to address <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-CVE-2012-1182">CVE-2012-1182 ("root" credential remote code execution)</a>.</p> + +<p>The uncompressed tarballs and patch files have been signed +using GnuPG (ID 6568B7EA).</p> +<p> +The source code can be downloaded here: +<li><a href="http://samba.org/samba/ftp/stable/samba-3.6.4.tar.gz">download Samba 3.6.4</a>,</li> +<li><a href="http://samba.org/samba/ftp/stable/samba-3.5.14.tar.gz">download Samba 3.5.14</a>,</li> +<li><a href="http://samba.org/samba/ftp/stable/samba-3.4.16.tar.gz">download Samba 3.4.16</a>.</li> +</p> + +<p> +Patches against the parents are also available: +<li><a href="http://samba.org/samba/ftp/patches/patch-3.6.3-3.6.4.diffs.gz">patch Samba 3.6.3/3.6.3</a>,</li> +<li><a href="http://samba.org/samba/ftp/patches/patch-3.5.13-3.5.14.diffs.gz">patch Samba 3.5.13/3.5.14</a>,</li> +<li><a href="http://samba.org/samba/ftp/patches/patch-3.4.15-3.4.16.diffs.gz">patch Samba 3.4.15/3.4.16</a>.</li> +</p> + +<p> +Please see the release notes for more info: +<li><a href="http://samba.org/samba/history/samba-3.6.4.html">release notes Samba 3.6.4</a>,</li> +<li><a href="http://samba.org/samba/history/samba-3.5.14.html">release notes Samba 3.5.14</a>,</li> +<li><a href="http://samba.org/samba/history/samba-3.4.16.html">release notes Samba 3.4.16</a>.</li> +</p> + <h5><a name="SMB2.2 Interop Event">20 March 2012</a></h5> <p class="headline">Report: Microsoft SMB2.2 Interop Event</p> <p>A few Samba Team members recently accepted an invitation by Microsoft @@ -7,12 +34,3 @@ <p>If you are interested in this event and Samba's progress in the SMB2 area, please read <a href="/samba/news/developers/obnox-samba-team-visits-microsoft-for-smb2-2-interop-event.html">Michael's full report</a>.</p> - - <h5><a name="3.5.13">12 March 2012</a></h5> - <p class="headline">Samba 3.5.13 Available for Download</p> - <p>This is the latest stable release of the Samba 3.5 series.</p> - -<p>The uncompressed tarballs and patch files have been signed -using GnuPG (ID 6568B7EA). The source code can be -<a href="http://samba.org/samba/ftp/stable/samba-3.5.13.tar.gz">downloaded -now</a>. A <a href="http://samba.org/samba/ftp/patches/patch-3.5.12-3.5.13.diffs.gz">patch against Samba 3.5.12</a> is also available. See <a href="http://samba.org/samba/history/samba-3.5.13.html">the release notes for more info</a>.</p> diff --git a/history/header_history.html b/history/header_history.html index 472c0dc..f5e9bcc 100755 --- a/history/header_history.html +++ b/history/header_history.html @@ -9,10 +9,12 @@ <li><a href="/samba/history/">Release Notes</a> <li class="navSub"> <ul> + <li><a href="samba-3.6.4.html">samba-3.6.4</a></li> <li><a href="samba-3.6.3.html">samba-3.6.3</a></li> <li><a href="samba-3.6.2.html">samba-3.6.2</a></li> <li><a href="samba-3.6.1.html">samba-3.6.1</a></li> <li><a href="samba-3.6.0.html">samba-3.6.0</a></li> + <li><a href="samba-3.5.14.html">samba-3.5.14</a></li> <li><a href="samba-3.5.13.html">samba-3.5.13</a></li> <li><a href="samba-3.5.12.html">samba-3.5.12</a></li> <li><a href="samba-3.5.11.html">samba-3.5.11</a></li> @@ -27,6 +29,7 @@ <li><a href="samba-3.5.2.html">samba-3.5.2</a></li> <li><a href="samba-3.5.1.html">samba-3.5.1</a></li> <li><a href="samba-3.5.0.html">samba-3.5.0</a></li> + <li><a href="samba-3.4.16.html">samba-3.4.16</a></li> <li><a href="samba-3.4.15.html">samba-3.4.15</a></li> <li><a href="samba-3.4.14.html">samba-3.4.14</a></li> <li><a href="samba-3.4.13.html">samba-3.4.13</a></li> diff --git a/history/samba-3.4.16.html b/history/samba-3.4.16.html new file mode 100755 index 0000000..aaee971 --- /dev/null +++ b/history/samba-3.4.16.html @@ -0,0 +1,41 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml"> + +<head> +<title>Samba - Release Notes Archive</title> +</head> + +<body> + + <H2>Samba 3.4.16 Available for Download</H2> + +<p> +<pre> + ============================== + Release Notes for Samba 3.4.16 + April 10, 2011 + ============================== + + +This is a security release in order to address +CVE-2012-1182 ("root" credential remote code execution). + +o CVE-2012-1182: + Samba 3.0.x to 3.6.3 are affected by a + vulnerability that allows remote code + execution as the "root" user. + + +Changes since 3.4.15 +-------------------- + + +o Stefan Metzmacher <me...@samba.org> + *BUG 8815: PIDL based autogenerated code allows overwriting beyond of + allocated array (CVE-2012-1182). +</pre> +</p> + +</body> +</html> diff --git a/history/samba-3.5.14.html b/history/samba-3.5.14.html new file mode 100755 index 0000000..a6f1b52 --- /dev/null +++ b/history/samba-3.5.14.html @@ -0,0 +1,40 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml"> + +<head> +<title>Samba - Release Notes Archive</title> +</head> + +<body> + + <H2>Samba 3.5.14 Available for Download</H2> + +<p> +<pre> + ============================== + Release Notes for Samba 3.5.14 + April 10, 2012 + ============================== + + +This is a security release in order to address +CVE-2012-1182 ("root" credential remote code execution). + +o CVE-2012-1182: + Samba 3.0.x to 3.6.3 are affected by a + vulnerability that allows remote code + execution as the "root" user. + + +Changes since 3.5.13: +--------------------- + + +o Stefan Metzmacher <me...@samba.org> + *BUG 8815: PIDL based autogenerated code allows overwriting beyond of + allocated array (CVE-2012-1182). +</pre> + +</body> +</html> diff --git a/history/samba-3.6.4.html b/history/samba-3.6.4.html new file mode 100755 index 0000000..ceb7fa5 --- /dev/null +++ b/history/samba-3.6.4.html @@ -0,0 +1,40 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml"> + +<head> +<title>Samba - Release Notes Archive</title> +</head> + +<body> + + <H2>Samba 3.6.4 Available for Download</H2> + +<p> +<pre> + ============================= + Release Notes for Samba 3.6.4 + April 10, 2012 + ============================= + + +This is a security release in order to address +CVE-2012-1182 ("root" credential remote code execution). + +o CVE-2012-1182: + Samba 3.0.x to 3.6.3 are affected by a + vulnerability that allows remote code + execution as the "root" user. + + +Changes since 3.6.3: +-------------------- + + +o Stefan Metzmacher <me...@samba.org> + *BUG 8815: PIDL based autogenerated code allows overwriting beyond of + allocated array (CVE-2012-1182). +</pre> + +</body> +</html> diff --git a/history/security.html b/history/security.html index 4439835..cf2efcb 100755 --- a/history/security.html +++ b/history/security.html @@ -22,6 +22,26 @@ link to full release notes for each release.</p> </tr> <tr> + <td>10 Apr 2012</td> + <td><a href="/samba/ftp/patches/security/samba-3.0.37-CVE-2012-1182.patch"> + patch for Samba 3.0.37</a> + <a href="/samba/ftp/patches/security/samba-3.2.15-CVE-2012-1182.patch"> + patch for Samba 3.2.15</a> + <a href="/samba/ftp/patches/security/samba-3.3.16-CVE-2012-1182.patch"> + patch for Samba 3.3.16</a> + <a href="/samba/ftp/patches/security/samba-3.4.15-CVE-2012-1182.patch"> + patch for Samba 3.4.15</a> + <a href="/samba/ftp/patches/security/samba-3.5.13-CVE-2012-1182.patch"> + patch for Samba 3.5.13</a> + <a href="/samba/ftp/patches/security/samba-3.6.3-CVE-2012-1182.patch"> + patch for Samba 3.6.3</a> + <td>"root" credential remote code execution</td> + <td>all current releases</td> + <td><a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182">CVE-2012-1182</a></td> + <td><a href="/samba/security/CVE-2012-1182">Announcement</a></td> + </tr> + + <tr> <td>23 Feb 2012</td> <td><a href="/samba/ftp/patches/security/samba-3.0-CVE-2012-0870.patch"> patch for Samba 3.0</a> diff --git a/latest_stable_release.html b/latest_stable_release.html index 631f0c2..4fe9ed1 100644 --- a/latest_stable_release.html +++ b/latest_stable_release.html @@ -1,5 +1,5 @@ <p> - <a href="/samba/ftp/stable/samba-3.6.3.tar.gz">Samba 3.6.3 (gzipped)</a><br> - <a href="/samba/history/samba-3.6.3.html">Release Notes</a> · - <a href="/samba/ftp/stable/samba-3.6.3.tar.asc">Signature</a> + <a href="/samba/ftp/stable/samba-3.6.4.tar.gz">Samba 3.6.4 (gzipped)</a><br> + <a href="/samba/history/samba-3.6.4.html">Release Notes</a> · + <a href="/samba/ftp/stable/samba-3.6.4.tar.asc">Signature</a> </p> diff --git a/security/CVE-2012-1182.html b/security/CVE-2012-1182.html new file mode 100644 index 0000000..4aa1ca4 --- /dev/null +++ b/security/CVE-2012-1182.html @@ -0,0 +1,99 @@ +<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" + "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> +<html xmlns="http://www.w3.org/1999/xhtml"> + +<head> +<title>Samba - Security Announcement Archive</title> +</head> + +<body> + + <H2>CVE-2012-1182:</H2> + +<p> +<pre> +=========================================================== +== Subject: "root" credential remote code execution. +== +== CVE ID#: CVE-2012-1182 +== +== Versions: Samba 3.0.x - 3.6.3 (inclusive) +== +== Summary: Samba 3.0.x to 3.6.3 are affected by a +== vulnerability that allows remote code +== execution as the "root" user. +== +=========================================================== + +=========== +Description +=========== + +Samba versions 3.6.3 and all versions previous to this are affected by +a vulnerability that allows remote code execution as the "root" user +from an anonymous connection. + +The code generator for Samba's remote procedure call (RPC) code +contained an error which caused it to generate code containing a +security flaw. This generated code is used in the parts of Samba that +control marshalling and unmarshalling of RPC calls over the network. + +The flaw caused checks on the variable containing the length of an +allocated array to be done independently from the checks on the +variable used to allocate the memory for that array. As both these +variables are controlled by the connecting client it makes it possible +for a specially crafted RPC call to cause the server to execute +arbitrary code. + +As this does not require an authenticated connection it is the most +serious vulnerability possible in a program, and users and vendors are +encouraged to patch their Samba installations immediately. + +================== +Patch Availability +================== + +Patches addressing this issue have been posted to: + + http://www.samba.org/samba/security/ + +Additionally, Samba 3.6.4, Samba 3.5.14 and 3.4.16 have been issued as +security releases to correct the defect. Patches against older Samba +versions are available at: + + http://samba.org/samba/patches/ + +Samba administrators running affected versions are advised to upgrade +to 3.6.4, 3.5.14, or 3.4.16 or apply these patches as soon as +possible. + +Due to the seriousness of this vulnerability, patches have been +released for all Samba versions currently out of support and +maintenance from 3.0.37 onwards. + + +========== +Workaround +========== + +Samba contains a "hosts allow" parameter that can be used inside +smb.conf to restrict the clients allowed to connect to the server to a +trusted list. This can be used to help mitigate the problem caused by +this bug but it is by no means a real fix, as client addresses can be +easily faked. + + +======= +Credits +======= + +This vulnerability and proof of concept code was provided by Brian +Gorenc as well as an anonymous researcher working with HP's Zero Day +Initiative program. The Samba Team would like to thank them for +reporting the problem and their cooperation in this matter. + +Patches were provided by Stefan Metzmacher of the Samba team, based on +initial work by Volker Lendecke. +</pre> +</body> +</html> -- Samba Website Repository