Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2004.0567 -- Samba Security Advisory Samba 3.0.x Denial of Service Flaw 14 September 2004 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Samba 3.0.x prior to and including 3.0.6 Publisher: Samba Operating System: UNIX variants Linux variants Impact: Denial of Service Access: Remote/Unauthenticated CVE Names: CAN-2004-0808 CAN-2004-0807 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Subject: Samba 3.0.x Denial of Service Flaw Summary: (i) A DoS bug in smbd may allow an unauthenticated user to cause smbd to spawn new processes each one entering an infinite loop. After sending a sufficient amount of packets it is possible to exhaust the memory resources on the server. (ii) A DoS bug in nmbd may allow an attacker to remotely crash the nmbd daemon. Affected Versions: Defect (i) affects Samba 3.0.x prior to and including v3.0.6. Defect (ii) affects Samba 3.0.x prior to and including v3.0.6. Patch Availability: The patch file for Samba 3.0.5 addressing both bugs (samba-3.0.5-DoS.patch) can be downloaded from http://download.samba.org/samba/ftp/patches/security/ Description - - ----------- CAN-2004-0807: A defect in smbd's ASN.1 parsing allows an attacker to send a specially crafted packet during the authentication request which will send the newly spawned smbd process into an infinite loop. Given enough of these packets, it is possible to exhaust the available memory on the server. CAN-2004-0808: A defect in nmbd's process of mailslot packets can allow an attacker to anonymously crash nmbd. Protecting Unpatched Servers - - ---------------------------- The Samba Team always encourages users to run the latest stable release as a defense of against attacks. However, under certain circumstances it may not be possible to immediately upgrade important installations. In such cases, administrators should read the "Server Security" documentation found at http://www.samba.org/samba/docs/server_security.html. Credits - - -------- Both security issues were reported to Samba developers by iDEFENSE (http://www.idefense.com/). The defect discovery was anonymously reported to iDEFENSE via their Vulnerability Contributor Program (http://www.idefense.com/poi/teams/vcp.jsp). - - -- Our Code, Our Bugs, Our Responsibility. -- The Samba Team - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFBRYrsIR7qMdg1EfYRAs0vAKDWgtClvlXUp0K8vcXCpBX4Rxs8/QCeLn42 a36LLoki3iL2l5veoMUAXso= =LT1R - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQUZpXSh9+71yA2DNAQKRIwP5AT1JWhn6BljooEPOsUYORqW8+WEn1LVl auS0hLTRYu+Z0qMAzLXgEXkwC4tMdhq/Dhg9sX6X5gNafdRtJZv9D6XZqOY6EIez pSlZP9Ow0FYuQgNWKRciBiF1qVbbnZ5I+DzCn6a9Or2ycRApKkdQqLiGoHq1rYIK 84MspY3Uy2E= =D73/ -----END PGP SIGNATURE-----