Launchpad has imported 17 comments from the remote bug at
https://bugs.gentoo.org/show_bug.cgi?id=200773.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2007-11-29T20:18:32+00:00 rbu wrote:

Secunia Research has discovered a vulnerability in Samba, which can be
exploited by malicious people to compromise a vulnerable system.

The vulnerability is caused due to a boundary error within the
"send_mailslot()" function. This can be exploited to cause a stack-based
buffer overflow with zero bytes via a specially crafted "SAMLOGON"
domain logon packet containing a username string placed at an odd offset
followed by an overly long GETDC string.

Successful exploitation allows execution of arbitrary code, but requires
that the "domain logon" option is enabled.

The vulnerability is confirmed in version 3.0.27a. Other versions may
also be affected.

Vulnerability Details:
----------------------

The buffer overflow is triggered by the call to "set_message()" in
nmbd/nmbd_packets.c at line 1895. The "set_message()" function will call
a "memset()" to zero on "dgram->data" + 35 with a length bigger than the
available 576-35 bytes for an overly long total length for the SAMLOGON
GETDC, username, workgroup, and local hostname.

The vulnerability would at first glance be only triggerable in certain
unusual configurations with an overly long local workgroup or hostname
due to the limitations in size of the NetBIOS Datagram packet (576
bytes). However if an empty (two zero bytes) Unicode username is placed
at an odd offset within the SAMLOGON request, the "pull_ucs2_pstring()"
function called at line 365 in nmbd/nmbd_processlogon.c will convert the
whole GETDC string following the username into ascuser, allowing the
buffer overflow to take place in standard configurations.

Exploitation:
-------------

Secunia Research has created a PoC for the vulnerability, which is
available upon request.

The vulnerability can also be reproduced by sending a SAMLOGON request
with an empty username placed at an odd offset and an overly long GETDC
string (around 250 bytes).

Closing comments:
-----------------

We have assigned this vulnerability Secunia advisory SA27760 and CVE
identifier CVE-2007-6015.

A preliminary disclosure date of 2007-12-05 10am CET has been set, where
the details will be publicly disclosed. However, we are naturally
prepared to push the disclosure date if you need more time to address
the vulnerability.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/0

------------------------------------------------------------------------
On 2007-11-29T20:19:35+00:00 rbu wrote:

Upstream is working on a patch.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/1

------------------------------------------------------------------------
On 2007-12-06T23:40:55+00:00 rbu wrote:

Created attachment 137917
CVE-2007-0615.patch

You know the drill, please do not commit, but add an updated ebuild to
this bug, so it can get testing and be committed to straight stable at
the release date.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/2

------------------------------------------------------------------------
On 2007-12-08T08:50:58+00:00 dev-zero wrote:

Created attachment 137995
samba-3.0.27a-r1.ebuild

Sorry for the delay, I was really busy yesterday...

The patch needs to be renamed to 3.0.27a-CVE-2007-0615.patch

Besides the requested patch, the ebuild fixes the bugs #200132 ("typo in
elog") and #199934 ("oneliner to remove +x bit from headers").

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/3

------------------------------------------------------------------------
On 2007-12-08T11:47:07+00:00 rbu wrote:

Please test the attached ebuild and report back at this bug.

Target keywords : "alpha amd64 arm hppa ia64 mips ppc ppc64 s390 sh
sparc x86"

Adding Arch Security Liaisons:
  alpha : ferdy
  amd64 : welp
   hppa : jer
    ppc : dertobi123
  ppc64 : corsair
  sparc : ferdy
    x86 : tsunam


Reply at: https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/4

------------------------------------------------------------------------
On 2007-12-08T17:53:50+00:00 jer wrote:

make test does its job right up to the SMBTORTURE4 tests. This isn't a
regression though, and all else looks OK for HPPA.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/5

------------------------------------------------------------------------
On 2007-12-08T22:08:15+00:00 welp wrote:

Ditto for amd64.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/6

------------------------------------------------------------------------
On 2007-12-09T07:58:24+00:00 corsair wrote:

looking as good on ppc64, too.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/7

------------------------------------------------------------------------
On 2007-12-09T10:59:21+00:00 armin76 wrote:

Looks fine on alpha/ia64/sparc/x86

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/8

------------------------------------------------------------------------
On 2007-12-09T16:18:42+00:00 dertobi123 wrote:

looks good for ppc

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/9

------------------------------------------------------------------------
On 2007-12-09T21:19:54+00:00 rbu wrote:

Please rename the patch to contain 6015 instead of 0615.

prestabled for all security supported arches. Tiziano, please prepare
for a commit  on Tuesday. The time is not confirmed yet.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/10

------------------------------------------------------------------------
On 2007-12-10T02:07:07+00:00 rbu wrote:

Samba folks will release their advisory at about 15 UTC and Secunia did
not reply to the schedule question.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/11

------------------------------------------------------------------------
On 2007-12-10T15:42:01+00:00 rbu wrote:

public now.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/12

------------------------------------------------------------------------
On 2007-12-10T16:40:57+00:00 dev-zero wrote:

commited as 3.0.28 (as released by upstream, contains only the security
update).

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/13

------------------------------------------------------------------------
On 2007-12-10T16:49:09+00:00 rbu wrote:

Arches, please test and mark stable net-fs/samba-3.0.28.
Target keywords : "alpha amd64 arm hppa ia64 mips ppc ppc64 s390 sh sparc x86"
Already stabled : "alpha amd64 hppa ia64 ppc ppc64 sparc x86"
Missing keywords: "arm mips s390 sh"


Reply at: 
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/14

------------------------------------------------------------------------
On 2007-12-10T21:09:35+00:00 py wrote:

GLSA 200712-10

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/15

------------------------------------------------------------------------
On 2008-03-06T09:53:00+00:00 pva wrote:

Does not affect current (2008.0) release. Removing release.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/comments/18


** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2007-0615

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/175502

Title:
  [samba] [CVE-2007-6015] remote buffer overflow vulnerability

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/175502/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to