출처 : http://www.samba.org/samba/security/CVE-2007-4138.html
== Subject: Incorrect primary group assignment for
== domain users using the rfc2307 or sfu
== winbind nss info plugin.
== CVE ID#: CVE-2007-4138
== Versions: Samba 3.0.25 - 3.0.25c (inclusive)
== Summary: When the "winbind nss info" parameter in
== smb.conf is set to either "sfu" or "rfc2307",
== Windows users are incorrectly assigned
== a primary gid of 0 in the absence of the
== RFC2307 or Services or Unix (SFU) primary
== group attributes.
The idmap_ad.so library provides an nss_info extension to Winbind
for retrieving a user's home directory path, login shell and
primary group id from an Active Directory domain controller. This
functionality is enabled by defining the "winbind nss info"
smb.conf option to either "sfu" or "rfc2307".
Both the Windows "Identity Management for Unix" and "Services for
Unix" MMC plug-ins allow a user to be assigned a primary group
for Unix clients that differs from the user's Windows primary group.
When the rfc2307 or sfu nss_info plugin has been enabled, in
the absence of either the RFC2307 or SFU primary group attribute,
Winbind will assign a primary group ID of 0 to the domain user
queried using the getpwnam() C library call.
A patch addressing this defect has been posted to
Additionally, Samba 3.0.26 has been issued as a security
release to correct the defect.
Samba and Active Directory administrators may avoid this security
issue by two methods:
(a) Ensure that all user's stored in AD are properly assigned a
Unix primary group, or
(b) Discontinue use of the sfu or rfc2307 "winbind nss info" plugin
until a patched version of the idmap_ad.so library can be
Note that the problem is only evident on servers using the sfu
or rfc2307 "winbind nss info" plugin and not those only making
use of Winbind's idmap_ad IDMap backend interface.
This vulnerability was reported to Samba developers by Rick King
as Samba Bug #4927.
The time line is as follows:
* Aug 29, 2007: Initial report from Rick King.
* Aug 29, 2007: First response from Samba developers confirming
the bug along with a proposed patch.
* Sep 4, 2007: Announcement to vendor-sec mailing list.
* Sep 11, 2007: Public security advisory made available.
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
srpm은 다음 링크에서 받을수 있습니다.
'Security' 카테고리의 다른 글
|rkhunter (rootkit hunter) (0)||2008.04.22|
|Linux kernel Local Exploit (0)||2008.02.13|
|Stack buffer overflow in nmbd's logon & Remote Code Execution in Samba's nmbd (2)||2007.11.16|
|제로보드4 원격코드실행 취약점 (0)||2007.11.08|
|DoS vulnerability in 2.6.x tcp option parser (0)||2007.08.08|
|Drupal Multiple cross site scripting vulnerabilities (1)||2007.07.27|
first4you 2007.11.17 15:45
Samba 3.0.27 Available for Download
Samba 3.0.27 is a security release to address CVE-2007-4572 and CVE-2007-5398.
The Samba 3.0.27 source code (GPG signature) can be downloaded now. If you prefer, the patch file against previous releases (GPG signature) is also available for download. Please read these instructions on how to verify the gpg signature. Precompiled packages will be made available on a volunteer basis and can be found in the Binary_Packages download area.
first4you 2007.12.11 22:44
============================================================== Subject: Boundary failure in GETDC mailslot== processing can result in a buffer overrun==== CVE ID#: CVE-2007-6015==== Versions: Samba 3.0.0 - 3.0.27a (inclusive)==== Summary: Specifically crafted GETDC mailslot requests== can trigger a boundary error in the domain== controller GETDC mail slot support which== can be remotely exploited to execute arbitrary== code.=======================================================================Description===========Secunia Research reported a vulnerability that allows forthe execution of arbitrary code in nmbd. This defect isonly be exploited when the "domain logons" parameter hasbeen enabled in smb.conf.==================Patch Availability==================A patch addressing this defect has been posted tohttp://www.samba.org/samba/security/Additionally, Samba 3.0.28 has been issued as a securityrelease to correct the defect.==========Workaround==========Samba administrators may avoid this security issue by disablingboth the "domain logons" options in the server's smb.conf file.Note that this will disable all domain controller features aswell.=======Credits=======This vulnerability was reported to Samba developers byAlin Rad Pop, Secunia Research.The time line is as follows:* Nov 22, 2007: Initial report to email@example.com.* Nov 22, 2007: First response from Samba developers confirmingthe bug along with a proposed patch.* Dec 10, 2007: Public security advisory made available.============================================================ Our Code, Our Bugs, Our Responsibility.== The Samba Team==========================================================