Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA048] DSA-048-3 samba


Vulnerability Assessment Details

[DSA048] DSA-048-3 samba

Vulnerability Assessment Summary
DSA-048-3 samba

Detailed Explanation for this Vulnerability Assessment

Marcus Meissner discovered that samba was not creating temporary
files safely in two places:


when a remote user queried a printer queue samba would create a
temporary file in which the queue data would be written. This was being
done using a predictable filename, and insecurely, permiting a local
attacker to trick samba into overwriting arbitrary files.
smbclient "more" and "mput" commands also created temporary files
in /tmp insecurely.


Both problems have been fixed in version 2.0.7-3.2, and we recommend
that you upgrade your samba package immediately. (This problem is also fixed
in the Samba 2.2 codebase.)

Note: DSA-048-1 included an incorrectly compiled sparc package, which
the second edition fixed.

The third edition of the advisory was made because Marc Jacobsen from HP
discovered that the security fixes from samba 2.0.8 did not fully fix the
/tmp symlink attack problem. The samba team released version 2.0.9 to fix
that, and those fixes have been added to version 2.0.7-3.3 of the Debian
samba packages.



Solution : http://www.debian.org/security/2001/dsa-048
Network Security Threat Level: High

Networks Security ID: 2617

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors

Intel Xeon E5-2620 2.00GHz 15M Cache Processor SR0KW
$22.99
Intel Xeon E5-2620 2.00GHz 15M Cache Processor SR0KW picture2 HP CPU Kit 586631-001 Intel Xeon X5650 2.66GHz/6core/594884-001 BL460c G7.
$39.99
2 HP CPU Kit 586631-001 Intel Xeon X5650 2.66GHz/6core/594884-001 BL460c G7. pictureDELL T630 2.5 TOWER SERVER E5-2637V4 3.5GHZ 192GB 1.8TB 10K 12G H330
$5529.0
DELL T630 2.5 TOWER SERVER E5-2637V4 3.5GHZ 192GB 1.8TB 10K 12G H330 pictureDELL T630 2.5 TOWER SERVER E5-2680V4 2.4GHZ 32GB 4 X 600GB 15K 12G H330
$4989.0
DELL T630 2.5 TOWER SERVER E5-2680V4 2.4GHZ 32GB 4 X 600GB 15K 12G H330 picture


Discussions

No Discussions have been posted on this vulnerability.