Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Debian Local Security Checks >> [DSA048] DSA-048-3 samba

Vulnerability Assessment Details

[DSA048] DSA-048-3 samba

Vulnerability Assessment Summary
DSA-048-3 samba

Detailed Explanation for this Vulnerability Assessment

Marcus Meissner discovered that samba was not creating temporary
files safely in two places:

when a remote user queried a printer queue samba would create a
temporary file in which the queue data would be written. This was being
done using a predictable filename, and insecurely, permiting a local
attacker to trick samba into overwriting arbitrary files.
smbclient "more" and "mput" commands also created temporary files
in /tmp insecurely.

Both problems have been fixed in version 2.0.7-3.2, and we recommend
that you upgrade your samba package immediately. (This problem is also fixed
in the Samba 2.2 codebase.)

Note: DSA-048-1 included an incorrectly compiled sparc package, which
the second edition fixed.

The third edition of the advisory was made because Marc Jacobsen from HP
discovered that the security fixes from samba 2.0.8 did not fully fix the
/tmp symlink attack problem. The samba team released version 2.0.9 to fix
that, and those fixes have been added to version 2.0.7-3.3 of the Debian
samba packages.

Solution :
Network Security Threat Level: High

Networks Security ID: 2617

Vulnerability Assessment Copyright: This script is (C) 2005 Michel Arboi

Cables, Connectors


No Discussions have been posted on this vulnerability.