Samba NSS host lookup Winbind Multiple Remote Buffer Overflow Vulnerabilities
BID:22410
Info
Samba NSS host lookup Winbind Multiple Remote Buffer Overflow Vulnerabilities
| Bugtraq ID: | 22410 |
| Class: | Boundary Condition Error |
| CVE: |
CVE-2007-0453 |
| Remote: | Yes |
| Local: | No |
| Published: | Feb 05 2007 12:00AM |
| Updated: | May 17 2007 09:38PM |
| Credit: | Olivier Gay is credited with the discovery of this vulnerability. |
| Vulnerable: |
Trustix Secure Linux 3.0 Trustix Secure Linux 2.2 Trustix Operating System Enterprise Server 2.0 SuSE SUSE Linux Enterprise Server 10 SuSE Suse Linux Enterprise Desktop 10 SuSE Linux Enterprise Server 9 SuSE Linux 10.1 x86-64 SuSE Linux 10.1 x86 SuSE Linux 10.1 ppc SuSE Linux 10.0 x86-64 SuSE Linux 10.0 x86 SuSE Linux 10.0 ppc Samba Samba 3.0.22 Samba Samba 3.0.21 Samba Samba 3.0.23d Samba Samba 3.0.21c Samba Samba 3.0.21b Samba Samba 3.0.21a S.u.S.E. openSUSE 10.2 S.u.S.E. Open-Enterprise-Server 0 S.u.S.E. Novell Linux POS 9 S.u.S.E. Novell Linux Desktop 9 S.u.S.E. Linux Professional 10.0 OSS S.u.S.E. Linux Professional 10.0 S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Professional 10.1 S.u.S.E. Linux Personal 10.0 OSS S.u.S.E. Linux Personal 9.3 x86_64 S.u.S.E. Linux Personal 9.3 S.u.S.E. Linux Personal 10.1 rPath rPath Linux 1 OpenPKG OpenPKG E1.0-Solid |
| Not Vulnerable: |
Samba Samba 3.0.24 |
Discussion
Samba NSS host lookup Winbind Multiple Remote Buffer Overflow Vulnerabilities
Samba is prone to multiple remote buffer-overflow vulnerabilities because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker may exploit these issues to execute arbitrary code with superuser privileges, completely compromising affected computers. Failed exploit attempts will result in a denial of service.
These issues affects versions 3.0.21 to 3.0.23d.
Samba is prone to multiple remote buffer-overflow vulnerabilities because the application fails to bounds-check user-supplied data before copying it into an insufficiently sized buffer.
An attacker may exploit these issues to execute arbitrary code with superuser privileges, completely compromising affected computers. Failed exploit attempts will result in a denial of service.
These issues affects versions 3.0.21 to 3.0.23d.
Exploit / POC
Samba NSS host lookup Winbind Multiple Remote Buffer Overflow Vulnerabilities
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
Currently we are not aware of any exploits for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: mailto:[email protected].
Solution / Fix
Samba NSS host lookup Winbind Multiple Remote Buffer Overflow Vulnerabilities
Solution:
The vendor released an update to address this issue. Please see the references for more information.
Samba Samba 3.0.23d
Samba Samba 3.0.22
Solution:
The vendor released an update to address this issue. Please see the references for more information.
Samba Samba 3.0.23d
-
SuSE samba-3.0.23d-19.2.i586.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/samba-3.0.23d-19.2.i5 86.rpm -
SuSE samba-3.0.23d-19.2.ppc.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/samba-3.0.23d-19.2.ppc .rpm -
SuSE samba-3.0.23d-19.2.x86_64.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-3.0.23d-19.2. x86_64.rpm -
SuSE samba-32bit-3.0.23d-19.2.x86_64.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-32bit-3.0.23d -19.2.x86_64.rpm -
SuSE samba-client-3.0.23d-19.2.i586.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/samba-client-3.0.23d- 19.2.i586.rpm -
SuSE samba-client-3.0.23d-19.2.ppc.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/samba-client-3.0.23d-1 9.2.ppc.rpm -
SuSE samba-client-3.0.23d-19.2.x86_64.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-client-3.0.23 d-19.2.x86_64.rpm -
SuSE samba-client-32bit-3.0.23d-19.2.x86_64.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-client-32bit- 3.0.23d-19.2.x86_64.rpm -
SuSE samba-winbind-3.0.23d-19.2.i586.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/i586/samba-winbind-3.0.23d -19.2.i586.rpm -
SuSE samba-winbind-3.0.23d-19.2.ppc.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/ppc/samba-winbind-3.0.23d- 19.2.ppc.rpm -
SuSE samba-winbind-3.0.23d-19.2.x86_64.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-winbind-3.0.2 3d-19.2.x86_64.rpm -
SuSE samba-winbind-32bit-3.0.23d-19.2.x86_64.rpm
openSUSE 10.2:
ftp://ftp.suse.com/pub/suse/update/10.2/rpm/x86_64/samba-winbind-32bit -3.0.23d-19.2.x86_64.rpm
Samba Samba 3.0.22
-
SuSE samba-3.0.22-13.27.i586.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/samba-3.0.22-13.27.i5 86.rpm -
SuSE samba-3.0.22-13.27.ppc.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/samba-3.0.22-13.27.ppc .rpm -
SuSE samba-3.0.22-13.27.x86_64.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-3.0.22-13.27. x86_64.rpm -
SuSE samba-32bit-3.0.22-13.27.x86_64.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-32bit-3.0.22- 13.27.x86_64.rpm -
SuSE samba-client-3.0.22-13.27.i586.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/samba-client-3.0.22-1 3.27.i586.rpm -
SuSE samba-client-3.0.22-13.27.ppc.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/samba-client-3.0.22-13 .27.ppc.rpm -
SuSE samba-client-3.0.22-13.27.x86_64.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-client-3.0.22 -13.27.x86_64.rpm -
SuSE samba-client-32bit-3.0.22-13.27.x86_64.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-client-32bit- 3.0.22-13.27.x86_64.rpm -
SuSE samba-winbind-3.0.22-13.27.i586.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/i586/samba-winbind-3.0.22- 13.27.i586.rpm -
SuSE samba-winbind-3.0.22-13.27.ppc.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/ppc/samba-winbind-3.0.22-1 3.27.ppc.rpm -
SuSE samba-winbind-3.0.22-13.27.x86_64.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-winbind-3.0.2 2-13.27.x86_64.rpm -
SuSE samba-winbind-32bit-3.0.22-13.27.x86_64.rpm
SUSE LINUX 10.1:
ftp://ftp.suse.com/pub/suse/update/10.1/rpm/x86_64/samba-winbind-32bit -3.0.22-13.27.x86_64.rpm
References
Samba NSS host lookup Winbind Multiple Remote Buffer Overflow Vulnerabilities
References:
References: