Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2001.156 -- Debian Security Advisory DSA-048-1 samba symlink attacks 18 April 2001 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: samba Vendor: Debian Operating System: Debian GNU/Linux 2.2 Linux Platform: alpha arm i386 m68k powerpc sparc Impact: Overwrite Arbitrary Files Access Required: Local - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- - - ------------------------------------------------------------------------ Debian Security Advisory DSA-048-1 security@debian.org http://www.debian.org/security/ Wichert Akkerman April 18, 2001 - - ------------------------------------------------------------------------ Package : samba Problem type : symlink attack Debian-specific: no Marcus Meissner discovered that samba was not creating temporary files safely in two places: * when a remote user queried a printer queue samba would creates a temporary file in which the queue data would be written. This was doing using a predictable filename and insecurely, allowing a local attacker to trick samba into overwriting arbitrary files. * smbclient "more" and "mput" commands also creates temporary files in /tmp insecurely. Both problems have been fixed in version 2.0.7-3.2. and we recommand that you upgrade your samba package immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.2 alias potato - - --------------------------------- Potato was released for alpha, arm, i386, m68k, powerpc and sparc. Source archives: http://security.debian.org/dists/stable/updates/main/source/samba_2.0.7-3.2.diff.gz MD5 checksum: 82f8739acbd18c2ea8756ca705d17fef http://security.debian.org/dists/stable/updates/main/source/samba_2.0.7-3.2.dsc MD5 checksum: 9db59a582e19daf987c8a0ed967ca191 http://security.debian.org/dists/stable/updates/main/source/samba_2.0.7.orig.tar.gz MD5 checksum: b5e61ea655d476072fd0365785fea2d0 Architecture indendent archives: http://security.debian.org/dists/stable/updates/main/binary-all/samba-doc_2.0.7-3.2_all.deb MD5 checksum: 5e141a7224ce79f11e9b2064437798ca Alpha architecture: http://security.debian.org/dists/stable/updates/main/binary-alpha/samba-common_2.0.7-3.2_alpha.deb MD5 checksum: 6a2f7e7a57ab35886c8bfdfe3798d5ea http://security.debian.org/dists/stable/updates/main/binary-alpha/samba_2.0.7-3.2_alpha.deb MD5 checksum: 742bdfcd38f1601e9da31c45b0998222 http://security.debian.org/dists/stable/updates/main/binary-alpha/smbclient_2.0.7-3.2_alpha.deb MD5 checksum: eee19cafe89c836727320d08056584e2 http://security.debian.org/dists/stable/updates/main/binary-alpha/smbfs_2.0.7-3.2_alpha.deb MD5 checksum: edbe76558ce16b42267f9e0836787d49 http://security.debian.org/dists/stable/updates/main/binary-alpha/swat_2.0.7-3.2_alpha.deb MD5 checksum: 7953a130bc363c1c7b62e87a1e0e7121 ARM architecture: http://security.debian.org/dists/stable/updates/main/binary-arm/samba-common_2.0.7-3.2_arm.deb MD5 checksum: 6217609b05ceb4a39bcd02abc3524a5d http://security.debian.org/dists/stable/updates/main/binary-arm/samba_2.0.7-3.2_arm.deb MD5 checksum: ca294748daf3e2e154801599c51ffd35 http://security.debian.org/dists/stable/updates/main/binary-arm/smbclient_2.0.7-3.2_arm.deb MD5 checksum: cf095c92a9628ffbe2211b6a1c87d184 http://security.debian.org/dists/stable/updates/main/binary-arm/smbfs_2.0.7-3.2_arm.deb MD5 checksum: 3403c99981c349ea0bf36f557f1e8067 http://security.debian.org/dists/stable/updates/main/binary-arm/swat_2.0.7-3.2_arm.deb MD5 checksum: a03ee71fefd16b53a04a5a9046d5f419 Intel ia32 architecture: http://security.debian.org/dists/stable/updates/main/binary-i386/samba-common_2.0.7-3.2_i386.deb MD5 checksum: 28d1ca225b39dbba8e427c4a3ff4db5e http://security.debian.org/dists/stable/updates/main/binary-i386/samba_2.0.7-3.2_i386.deb MD5 checksum: 624e9fc767b45fcaee386e83def462b0 http://security.debian.org/dists/stable/updates/main/binary-i386/smbclient_2.0.7-3.2_i386.deb MD5 checksum: ad4b5f2da854a7d4a7224cb8f87eb4bc http://security.debian.org/dists/stable/updates/main/binary-i386/smbfs_2.0.7-3.2_i386.deb MD5 checksum: 7d344d86f479417398a47c467b15202f http://security.debian.org/dists/stable/updates/main/binary-i386/swat_2.0.7-3.2_i386.deb MD5 checksum: c488d0e582b63a47743943c53a8b94ec Motorola 680x0 architecture: http://security.debian.org/dists/stable/updates/main/binary-m68k/samba-common_2.0.7-3.2_m68k.deb MD5 checksum: bb80db7568a979598bb97ebe72734111 http://security.debian.org/dists/stable/updates/main/binary-m68k/samba_2.0.7-3.2_m68k.deb MD5 checksum: ea048e0bebea6005ea137fae614ceb1e http://security.debian.org/dists/stable/updates/main/binary-m68k/smbclient_2.0.7-3.2_m68k.deb MD5 checksum: 41e467e2f5fa8c37ad590e791c4bb986 http://security.debian.org/dists/stable/updates/main/binary-m68k/smbfs_2.0.7-3.2_m68k.deb MD5 checksum: 1a64849dde006f826008be44ee2a1fc6 http://security.debian.org/dists/stable/updates/main/binary-m68k/swat_2.0.7-3.2_m68k.deb MD5 checksum: 0fad867c08bd94114d5e6d5b9cfc55df PowerPC architecture: http://security.debian.org/dists/stable/updates/main/binary-powerpc/samba-common_2.0.7-3.2_powerpc.deb MD5 checksum: 1b14775f54e370e2c7fcd7adfa0a083f http://security.debian.org/dists/stable/updates/main/binary-powerpc/samba_2.0.7-3.2_powerpc.deb MD5 checksum: 4d8d1721a0d62179b3a15c9198e96974 http://security.debian.org/dists/stable/updates/main/binary-powerpc/smbclient_2.0.7-3.2_powerpc.deb MD5 checksum: 3dd961b0b1e0665a3b963530d45ce61c http://security.debian.org/dists/stable/updates/main/binary-powerpc/smbfs_2.0.7-3.2_powerpc.deb MD5 checksum: 89cb67b2550f324435a7946ae9441eea http://security.debian.org/dists/stable/updates/main/binary-powerpc/swat_2.0.7-3.2_powerpc.deb MD5 checksum: f9bcaa966f37c1f4c244e4d2dfdda9b8 Sun Sparc architecture: http://security.debian.org/dists/stable/updates/main/binary-sparc/samba-common_2.0.7-3.2_sparc.deb MD5 checksum: 22623e59f94d4b9389f415bf551902ad http://security.debian.org/dists/stable/updates/main/binary-sparc/samba_2.0.7-3.2_sparc.deb MD5 checksum: 0a61c286bcff8265ffac42f9e16c2cfb http://security.debian.org/dists/stable/updates/main/binary-sparc/smbclient_2.0.7-3.2_sparc.deb MD5 checksum: a69169f02ef3fdede523f406c36cd12a http://security.debian.org/dists/stable/updates/main/binary-sparc/smbfs_2.0.7-3.2_sparc.deb MD5 checksum: 2aa6c4b0a0228e38427c09dec251b487 http://security.debian.org/dists/stable/updates/main/binary-sparc/swat_2.0.7-3.2_sparc.deb MD5 checksum: 7f6971d7cc236fde6307a666852b5e1c These files will be moved into ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon. For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ . - - -- - - ---------------------------------------------------------------------------- apt-get: deb http://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org - -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQB1AwUBOtzcZKjZR/ntlUftAQFEygMApMpcDQsNb4Dxpx4btCFKjKb3OoUNaad9 Jn6Nx8J1UnPXs47L8GebUewq9KNaC5wi0GMJGbV2EhJEkK91I6ElIDPetuekQi5a 5+2jLeN0Y4v+BkvJ73z5TTwlyV6SD4B8 =lGKB - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the original authors to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/Information/advisories.html If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for emergencies. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key iQCVAwUBOt3BRih9+71yA2DNAQHF4AP+K/U+Q5mFbAABNmZdSApmTz+wiYJhUcLV R3MrtIsgQgF8ZkbiEN8DvulC/rrcn5jDv2cnERmzQ/FqEEKqJGz5N9Cv5NFrKzzS 5PiGqICu3zn99DZHZlgR9bCSXHldZWD8j3OrMFcaLkgvDn7o6hZPLpI6ApVNgmNL yKJr0zZHGg0= =Vhva -----END PGP SIGNATURE-----