CERTA-2004-AVI-402

Vulnerability from certfr_avis - Published: 2004-12-17 - Updated: 2005-02-04

None

Description

Samba est un logiciel libre utilisé pour la mise en œuvre des partages réseau à l'aide des protocoles SMB et CIFS sous Unix.

Une vulnérabilité de type débordement de mémoire est présente dans le processus smbd lors du traitement des paramètres de sécurité associés à un fichier. Un utilisateur distant, préalablement authentifié, peut utiliser cette vulnérabilité pour exécuter du code arbitraire à distance avec les privilèges du super-utilisateur root sur le système vulnérable.

Solution

La version 3.0.10 de Samba corrige cette vulnérabilité.

Samba 3.0.9 et versions antérieures.

Impacted products
Vendor Product Description

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cp\u003eSamba 3.0.9 et versions ant\u00e9rieures.\u003c/p\u003e",
  "content": "## Description\n\nSamba est un logiciel libre utilis\u00e9 pour la mise en \u0153uvre des partages\nr\u00e9seau \u00e0 l\u0027aide des protocoles SMB et CIFS sous Unix.\n\n  \n\nUne vuln\u00e9rabilit\u00e9 de type d\u00e9bordement de m\u00e9moire est pr\u00e9sente dans le\nprocessus smbd lors du traitement des param\u00e8tres de s\u00e9curit\u00e9 associ\u00e9s \u00e0\nun fichier. Un utilisateur distant, pr\u00e9alablement authentifi\u00e9, peut\nutiliser cette vuln\u00e9rabilit\u00e9 pour ex\u00e9cuter du code arbitraire \u00e0 distance\navec les privil\u00e8ges du super-utilisateur root sur le syst\u00e8me vuln\u00e9rable.\n\n## Solution\n\nLa version 3.0.10 de Samba corrige cette vuln\u00e9rabilit\u00e9.\n",
  "cves": [],
  "initial_release_date": "2004-12-17T00:00:00",
  "last_revision_date": "2005-02-04T00:00:00",
  "links": [
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP HPSBUX01115 du 02 f\u00e9vrier 2005 :",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX01115"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200412-13 du 17 d\u00e9cembre    2004 :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200412-13.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2004-681 du 21 d\u00e9cembre    2004 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2004-681.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 de samba :",
      "url": "http://us1.samba.org/samba/security/CAN-2004-1154.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 FreeBSD du 21 d\u00e9cembre 2004 :",
      "url": "http://www.vuxml.org/freebsd/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2004:045 du 22 d\u00e9cembre    2004 ;",
      "url": "http://www.novell.com/linux/security/advisories/2004_45_samba.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2004-670 du 16 d\u00e9cembre    2004 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2004-670.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Sun #57730 du 03 f\u00e9vrier 2005 :",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2004:158 du 27 d\u00e9cembre    2004 :",
      "url": "http://www.mandrakesoft.com/security/advisories?name=MDKSA-2004:158"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2005-020 du 05 janvier    2005 :",
      "url": "http://rhn.redhat.com/errata/RHSA-2005-020.html"
    }
  ],
  "reference": "CERTA-2004-AVI-402",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-12-17T00:00:00.000000"
    },
    {
      "description": "ajout r\u00e9f\u00e9rence aux bulletins de s\u00e9curit\u00e9 de Red Hat et Gentoo.",
      "revision_date": "2004-12-20T00:00:00.000000"
    },
    {
      "description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 de FreeBSD.",
      "revision_date": "2004-12-21T00:00:00.000000"
    },
    {
      "description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2004-681.",
      "revision_date": "2004-12-22T00:00:00.000000"
    },
    {
      "description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 SuSE SUSE-SA:2004:045.",
      "revision_date": "2004-12-23T00:00:00.000000"
    },
    {
      "description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Mandrake MDKSA-2004:158.",
      "revision_date": "2005-01-03T00:00:00.000000"
    },
    {
      "description": "ajout r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Red Hat RHSA-2005-020.",
      "revision_date": "2005-01-06T00:00:00.000000"
    },
    {
      "description": "ajout r\u00e9f\u00e9rences aux bulletins de s\u00e9curit\u00e9 HP HPSBUX01115 et Sun #57730.",
      "revision_date": "2005-02-04T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 de Samba",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 d\u0027iDEFENSE",
      "url": "http://www.idefense.com/application/poi/display?id=165\u0026type=vulnerabilities"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 de Samba",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…