Operating System:

Published:

17 April 2001

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

            ESB-2001.156 -- Debian Security Advisory DSA-048-1
                           samba symlink attacks
                               18 April 2001

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                samba
Vendor:                 Debian
Operating System:       Debian GNU/Linux 2.2
                        Linux
Platform:               alpha
                        arm
                        i386
                        m68k
                        powerpc
                        sparc
Impact:                 Overwrite Arbitrary Files
Access Required:        Local

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----

- - ------------------------------------------------------------------------
Debian Security Advisory DSA-048-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
April 18, 2001
- - ------------------------------------------------------------------------


Package        : samba
Problem type   : symlink attack
Debian-specific: no

Marcus Meissner discovered that samba was not creating temporary
files safely in two places:

* when a remote user queried a printer queue samba would creates a
  temporary file in which the queue data would be written. This was
  doing using a predictable filename and insecurely, allowing a local
  attacker to trick samba into overwriting arbitrary files.
* smbclient "more" and "mput" commands also creates temporary files
  in /tmp insecurely.

Both problems have been fixed in version 2.0.7-3.2. and we recommand
that you upgrade your samba package immediately.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- - ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/samba_2.0.7-3.2.diff.gz
      MD5 checksum: 82f8739acbd18c2ea8756ca705d17fef
    http://security.debian.org/dists/stable/updates/main/source/samba_2.0.7-3.2.dsc
      MD5 checksum: 9db59a582e19daf987c8a0ed967ca191
    http://security.debian.org/dists/stable/updates/main/source/samba_2.0.7.orig.tar.gz
      MD5 checksum: b5e61ea655d476072fd0365785fea2d0

  Architecture indendent archives:
    http://security.debian.org/dists/stable/updates/main/binary-all/samba-doc_2.0.7-3.2_all.deb
      MD5 checksum: 5e141a7224ce79f11e9b2064437798ca

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/samba-common_2.0.7-3.2_alpha.deb
      MD5 checksum: 6a2f7e7a57ab35886c8bfdfe3798d5ea
    http://security.debian.org/dists/stable/updates/main/binary-alpha/samba_2.0.7-3.2_alpha.deb
      MD5 checksum: 742bdfcd38f1601e9da31c45b0998222
    http://security.debian.org/dists/stable/updates/main/binary-alpha/smbclient_2.0.7-3.2_alpha.deb
      MD5 checksum: eee19cafe89c836727320d08056584e2
    http://security.debian.org/dists/stable/updates/main/binary-alpha/smbfs_2.0.7-3.2_alpha.deb
      MD5 checksum: edbe76558ce16b42267f9e0836787d49
    http://security.debian.org/dists/stable/updates/main/binary-alpha/swat_2.0.7-3.2_alpha.deb
      MD5 checksum: 7953a130bc363c1c7b62e87a1e0e7121

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/samba-common_2.0.7-3.2_arm.deb
      MD5 checksum: 6217609b05ceb4a39bcd02abc3524a5d
    http://security.debian.org/dists/stable/updates/main/binary-arm/samba_2.0.7-3.2_arm.deb
      MD5 checksum: ca294748daf3e2e154801599c51ffd35
    http://security.debian.org/dists/stable/updates/main/binary-arm/smbclient_2.0.7-3.2_arm.deb
      MD5 checksum: cf095c92a9628ffbe2211b6a1c87d184
    http://security.debian.org/dists/stable/updates/main/binary-arm/smbfs_2.0.7-3.2_arm.deb
      MD5 checksum: 3403c99981c349ea0bf36f557f1e8067
    http://security.debian.org/dists/stable/updates/main/binary-arm/swat_2.0.7-3.2_arm.deb
      MD5 checksum: a03ee71fefd16b53a04a5a9046d5f419

  Intel ia32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/samba-common_2.0.7-3.2_i386.deb
      MD5 checksum: 28d1ca225b39dbba8e427c4a3ff4db5e
    http://security.debian.org/dists/stable/updates/main/binary-i386/samba_2.0.7-3.2_i386.deb
      MD5 checksum: 624e9fc767b45fcaee386e83def462b0
    http://security.debian.org/dists/stable/updates/main/binary-i386/smbclient_2.0.7-3.2_i386.deb
      MD5 checksum: ad4b5f2da854a7d4a7224cb8f87eb4bc
    http://security.debian.org/dists/stable/updates/main/binary-i386/smbfs_2.0.7-3.2_i386.deb
      MD5 checksum: 7d344d86f479417398a47c467b15202f
    http://security.debian.org/dists/stable/updates/main/binary-i386/swat_2.0.7-3.2_i386.deb
      MD5 checksum: c488d0e582b63a47743943c53a8b94ec

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/samba-common_2.0.7-3.2_m68k.deb
      MD5 checksum: bb80db7568a979598bb97ebe72734111
    http://security.debian.org/dists/stable/updates/main/binary-m68k/samba_2.0.7-3.2_m68k.deb
      MD5 checksum: ea048e0bebea6005ea137fae614ceb1e
    http://security.debian.org/dists/stable/updates/main/binary-m68k/smbclient_2.0.7-3.2_m68k.deb
      MD5 checksum: 41e467e2f5fa8c37ad590e791c4bb986
    http://security.debian.org/dists/stable/updates/main/binary-m68k/smbfs_2.0.7-3.2_m68k.deb
      MD5 checksum: 1a64849dde006f826008be44ee2a1fc6
    http://security.debian.org/dists/stable/updates/main/binary-m68k/swat_2.0.7-3.2_m68k.deb
      MD5 checksum: 0fad867c08bd94114d5e6d5b9cfc55df

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/samba-common_2.0.7-3.2_powerpc.deb
      MD5 checksum: 1b14775f54e370e2c7fcd7adfa0a083f
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/samba_2.0.7-3.2_powerpc.deb
      MD5 checksum: 4d8d1721a0d62179b3a15c9198e96974
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/smbclient_2.0.7-3.2_powerpc.deb
      MD5 checksum: 3dd961b0b1e0665a3b963530d45ce61c
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/smbfs_2.0.7-3.2_powerpc.deb
      MD5 checksum: 89cb67b2550f324435a7946ae9441eea
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/swat_2.0.7-3.2_powerpc.deb
      MD5 checksum: f9bcaa966f37c1f4c244e4d2dfdda9b8

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/samba-common_2.0.7-3.2_sparc.deb
      MD5 checksum: 22623e59f94d4b9389f415bf551902ad
    http://security.debian.org/dists/stable/updates/main/binary-sparc/samba_2.0.7-3.2_sparc.deb
      MD5 checksum: 0a61c286bcff8265ffac42f9e16c2cfb
    http://security.debian.org/dists/stable/updates/main/binary-sparc/smbclient_2.0.7-3.2_sparc.deb
      MD5 checksum: a69169f02ef3fdede523f406c36cd12a
    http://security.debian.org/dists/stable/updates/main/binary-sparc/smbfs_2.0.7-3.2_sparc.deb
      MD5 checksum: 2aa6c4b0a0228e38427c09dec251b487
    http://security.debian.org/dists/stable/updates/main/binary-sparc/swat_2.0.7-3.2_sparc.deb
      MD5 checksum: 7f6971d7cc236fde6307a666852b5e1c

  These files will be moved into
  ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- - -- 
- - ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

- -----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBOtzcZKjZR/ntlUftAQFEygMApMpcDQsNb4Dxpx4btCFKjKb3OoUNaad9
Jn6Nx8J1UnPXs47L8GebUewq9KNaC5wi0GMJGbV2EhJEkK91I6ElIDPetuekQi5a
5+2jLeN0Y4v+BkvJ73z5TTwlyV6SD4B8
=lGKB
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content.  The decision to use any or all of this information is
the responsibility of each user or organisation, and should be done so in
accordance with site policies and procedures.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the original authors to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

	http://www.auscert.org.au/Information/advisories.html

If you believe that your system has been compromised, contact AusCERT or
your representative in FIRST (Forum of Incident Response and Security
Teams).

Internet Email: auscert@auscert.org.au
Facsimile:	(07) 3365 7031
Telephone:	(07) 3365 4417 (International: +61 7 3365 4417)
		AusCERT personnel answer during Queensland business hours
		which are GMT+10:00 (AEST).
		On call after hours for emergencies.

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3i
Charset: noconv
Comment: ftp://ftp.auscert.org.au/pub/auscert/AUSCERT_PGP.key

iQCVAwUBOt3BRih9+71yA2DNAQHF4AP+K/U+Q5mFbAABNmZdSApmTz+wiYJhUcLV
R3MrtIsgQgF8ZkbiEN8DvulC/rrcn5jDv2cnERmzQ/FqEEKqJGz5N9Cv5NFrKzzS
5PiGqICu3zn99DZHZlgR9bCSXHldZWD8j3OrMFcaLkgvDn7o6hZPLpI6ApVNgmNL
yKJr0zZHGg0=
=Vhva
-----END PGP SIGNATURE-----