Debian Project

Debian testing security team - Advisory

DTSA-41-1

Date Reported:
May 31th, 2007
Affected Package:
samba
Vulnerability:
several vulnerabilities
Problem-Scope:
remote
Debian-specific:
No
CVE:
CVE-2007-2444 CVE-2007-2446 CVE-2007-2447

More information:
Several issues have been identified in Samba, the SMB/CIFS file- and 
print-server implementation for GNU/Linux. 
 
CVE-2007-2444  
 
When translating SIDs to/from names using Samba local list of user and group 
accounts, a logic error in the smbd daemon's internal security stack may result 
in a transition to the root user id rather than the non-root user. The user is 
then able to temporarily issue SMB/CIFS protocol operations as the root user. 
This window of opportunity may allow the attacker to establish addition means 
of gaining root access to the server. 
 
CVE-2007-2446  
 
Various bugs in Samba's NDR parsing can allow a user to send specially crafted 
MS-RPC requests that will overwrite the heap space with user defined data. 
 
CVE-2007-2447  
 
Unescaped user input parameters are passed as arguments to /bin/sh allowing for 
remote command execution. 

For the testing distribution (lenny) this is fixed in version 3.0.24-6+lenny3
For the unstable distribution (sid) this is fixed in version 3.0.25-1

This upgrade is strongly recommended if you use samba.

If you have the secure testing lines in your sources.list, you can update by running this command as root:
apt-get update && apt-get upgrade


To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:

deb http://security.debian.org/ testing/updates main contrib non-free
deb-src http://security.debian.org/ testing/updates main contrib non-free


Valid HTML 4.01! Valid CSS!