-----BEGIN PGP SIGNED MESSAGE-----

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                      ESB-2004.0117 -- The Samba Team
                      Samba 3.0.2 Security Bug-Fixes
                             11 February 2004

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:                Samba 3.0.x
Publisher:              The Samba Team
Impact:                 Increased Privileges
                        Access Privileged Data
Access Required:        Remote
CVE Names:              CAN-2004-0082

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Here's another holiday release in time to be wrapped up for
Valentine's Day.

This is the latest stable release of Samba. This is the version
that all production Samba servers should be running for all
current bug-fixes.

It has been confirmed that previous versions of Samba 3.0 are
susceptible to a password initialization bug that could grant
an attacker unauthorized access to a user account created by
the mksmbpasswd.sh shell script.

The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CAN-2004-0082 to this issue.

Samba administrators not wishing to upgrade to the current
version should download the 3.0.2 release, build the pdbedit
tool, and run

~   root# pdbedit-3.0.2 --force-initialized-passwords

This will disable all accounts not possessing a valid password
(e.g. the password field has been set a string of X's).

Samba servers running 3.0.2 are not vulnerable to this bug
regardless of whether or not pdbedit has been used to sanitize
the passdb backend.

Additionally, some of the more visible bugs in 3.0.1 addressed
in the 3.0.2 release include:

~  o Joining a Samba domain from Pre-SP2 Windows 2000 clients.
~  o Logging onto a Samba domain from Windows XP clients.
~  o Problems with the %U and %u smb.conf variables in relation
~    to Windows 9x/ME clients.
~  o Kerberos failures due to an invalid in memory keytab
~    detection test.
~  o Updates to the ntlm_auth tool.
~  o Fixes for various SMB signing errors.
~  o Better separation of WINS and DNS queries for domain
~    controllers.
~  o Issues with nss_winbind FreeBSD and Solaris.
~  o Several crash bugs in smbd and winbindd.
~  o Output formatting fixes for smbclient for better
~    compatibility with scripts based on the 2.2 version.

The source code can be downloaded from :

~  http://download.samba.org/samba/ftp/

The uncompressed tarball and patch file have been signed
using GnuPG.  The Samba public key is available at

~  http://download.samba.org/samba/ftp/samba-pubkey.asc

Binary packages are available at

~  http://download.samba.org/samba/ftp/Binary_Packages/

A simplified version of the CVS log of updates since 3.0.1
can be found in the the download directory under the name
ChangeLog-3.0.1-3.0.2.  The release notes are also available
on-line at

~  http://www.samba.org/samba/whatsnew/samba-3.0.2.html

As always, all bugs (https://bugzilla.samba.org/) are our
responsibility.

~                                  --Enjoy
~                                  The Samba Team
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFAJ6PbIR7qMdg1EfYRAgUPAJ9CQ6KizLsyCzoR67+FL2X6VbFyfgCgjd2Q
/WQLrFSqcPnokVOweZqcJAQ=
=G/8i
- -----END PGP SIGNATURE-----
- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business 
                hours which are GMT+10:00 (AEST).  On call after hours 
                for member emergencies only.
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBQCmPHih9+71yA2DNAQH9JQP+IyeWLvIUJ8uw+jVp8hPRgLLhH4J6fv0K
rk7rXZOfgl6cAGHyggmzzKzkr9MgJ1GB7jCcP7HTKotg16wN2oooovxAqcrwh2Kq
RX/+8OxdAO3Uf84j6xWwYGmwbPKTbmU8nxAHwmqncHKq5JmzEKKqcKEffypY7zxG
J3R67D91i+A=
=W9de
-----END PGP SIGNATURE-----