Possible SAMBA Vulnerability 32
veg writes "The samba team have released 2.2.7 following the discovery of a secureity hole in versions 2.2.2 to 2.2.6 that could lead to remote root access. Eeek! Full story on the samba site"
No spitting on the Bus! Thank you, The Mgt.
Too much of a good thing (Score:5, Funny)
The samba team have released 2.2.7 following the discovery of a secureity hole in versions 2.2.2 to 2.2.6 that could lead to remote root access.
So, basically, they're vacillating on the question of full SMB compatibility?
-- MarkusQ
When (Score:2, Interesting)
Re:When (Score:5, Interesting)
Samba community were chasing a user reported core dump bug
and they noticed the problem.
They reported it to security@samba.org, and I fixed it that
night (with a perfectly correct CVS comment that also failed
to point out the security hole
We then worked with the Linux vendors via the vendorsec
mailing list to ensure they were all aware of the problem
and could issue updates at the same time we announced. Once
we'd tested the release, we pushed the button and released...
That is a nice textbook case of how Open Source/Free Software
security can work.
Cheers,
Jeremy Allison,
Samba Team
Re:When (Score:1)
Update to 2.2.7 which is mostly a security release, but fixes other minor bugs. [freebsd.org]
Re:When (Score:5, Insightful)
What about Apple? Do you work directly with them? I would wager that the millions of Mac OS X-equipped Macs sold each year are rapidly making Apple the #1 distributor of Samba...
it's a mystery (Score:1)
So how do they know it's broken again? ;^)
Re:it's a mystery (Score:3, Informative)
send it a packet that would overflow the buffer
Cheers,
Jeremy Allison,
Samba Team.
typical rant ahead (Score:2, Flamebait)
the slashdot team have released a story to the developers section following the discovery of a "secureity" hole in samba that could lead to remote root access
what does this have to do with developers? it has everything to do with a large base of the slashdot audience. this should be main page news.
embedded systems (Score:2)
Re:embedded systems (Score:1)
Re:embedded systems (Score:2)
Re:typical rant ahead (Score:3, Insightful)
Funny... (Score:1, Flamebait)
-malakai
Re:Funny... (Score:1)
Re:Funny... (Score:2, Insightful)
IE holes come in a "combo meal" Detail Desc + sample + any side item + toy ( If you want to play with the sample code )
This samba hole on ther other hand does not even have a concrete way to take advantage of.
From samba.org:
A security hole has been discovered in versions 2.2.2 through 2.2.6 of Samba that could potentially allow an attacker to gain root access on the target machine. The word "potentially" is used because there is no known exploit of this bug, and the Samba Team has not been able to craft one ourselves. However, the seriousness of the problem warrants this immediate 2.2.7 release.
In reality this isn't a big deal (Score:1)
The way to fix all of your Samba problems... (Score:1)
This should keep any machine from accessing internal Samba shares from an external connection and makes these kinds of vulnerabilities irrelevant. Unless you don't trust ppl on your own LAN...then you have other problems...
I can't think of any real reason to leave a NetBIOS port open to "the outside world"...so for those of us that actually firewall these ports, this is already taken care of...
Never ever trust your internal network. (Score:4, Informative)
I also strongly suggest you not to trust inhouse staff completely. Most hackings that really hurts are insiders that rarely gets discovered.
Re:Never ever trust your internal network. (Score:2)
And internal LAN is only useful if employees have a certain amount of freedom to do what they need...sure, most things should be password protected, remote access should have multiple "barriers to entry"...SecureID, Login, Pass, etc...
But...your argument could hold true for any amount of security. Certainly you must understand that at some time, you must trust your employees...
As for most exploits, they are simply too difficult to implement for your average user to "pull off"...for the rest of your users, they're probably too busy to bother...
Even then, there's going to be a small group of "troublemakers" that could cause problems, but they are probably going to be fired shortly anyhow...
So, in short...the only "secure" system is an unplugged system.
Re:Never ever trust your internal network. (Score:2)
Re:Never ever trust your internal network. (Score:2)
But then again, when your top programmers are all conspiring to befraud the company, there's not much you can do in IT...the only way to deal with that kind of situation is to clean up the mess...
In reality, HR skrewed up by letting anyone outside of executive staff know before hand (Peter shouldn't have been told till it happened)...But then again, Milton burns down the building...now how could IT prevent that?
Re:Never ever trust your internal network. (Score:1)
Re:The way to fix all of your Samba problems... (Score:1)
Re:Phew (Score:5, Funny)
mail it to me and we'll talk about getting you
working full time on Samba.
Yes, it could crash smbd (for the authenticated
user) but causing it to run code is another matter.
We couldn't work out how to do that, but hey, I'm
willing to believe you might know how. Show me.
Or are you just mouthing off with no expertise to
back it up ?
Regards,
Jeremy Allison,
Samba Team.