Re: [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses - Samba

This is a discussion on Re: [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses - Samba ; Hello Jerry, list, Could someone please provide a bit more information regarding this vulnerability, in terms of what configurations are affected? Everything I could find on Secunia and in the message below tells me that vulnerable are the cases when ...

+ Reply to Thread
Results 1 to 2 of 2

Thread: Re: [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses

  1. Re: [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses

    Hello Jerry, list,

    Could someone please provide a bit more information regarding this vulnerability, in terms of what configurations are affected?

    Everything I could find on Secunia and in the message below tells me that vulnerable are the cases when smbd acts as a client - what are they?

    Secunia suggests that: "Successful exploitation allows execution of arbitrary code by tricking a user into connecting to a malicious server (e.g. by clicking an "smb://" link) or by sending specially crafted packets to an "nmbd" server configured as a local or domain master browser. Do not connect to untrusted SMB servers or follow untrusted links."

    What could that mean? E.g. may we consider a situation when all "browser" settings are "no" and no DC on Samba (authentication is done via MS AD, Samba is a member of) plus it is not used for printing as not vulnerable?

    That would make our strategy for patching more clear as we'd like to avoid unnecessary downtimes.
    Please do not hesitate to move this discussion to samba-technical, if you feel it's more appropriate.


    Thanks,
    Alexander


    > > -----Original Message-----
    > > From: samba@lists.samba.org On Behalf Of Gerald (Jerry) Carter
    > > Sent: Wednesday, May 28, 2008 6:56 PM
    > > To: samba@samba.org
    > > Subject: [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses
    > >
    > > -----BEGIN PGP SIGNED MESSAGE-----
    > > Hash: SHA1
    > >
    > > ================================================== ========
    > > ==
    > > == Subject: Boundary failure when parsing SMB responses
    > > == can result in a buffer overrun
    > > ==
    > > == CVE ID#: CVE-2008-1105
    > > ==
    > > == Versions: Samba 3.0.0 - 3.0.29 (inclusive)
    > > ==
    > > == Summary: Specifically crafted SMB responses can result
    > > == in a heap overflow in the Samba client code.
    > > == Because the server process, smbd, can itself
    > > == act as a client during operations such as
    > > == printer notification and domain authentication,
    > > == this issue affects both Samba client and server
    > > == installations.
    > > ==
    > > ================================================== ========
    > >
    > > ===========
    > > Description
    > > ===========
    > >
    > > Secunia Research reported a vulnerability that allows for
    > > the execution of arbitrary code in smbd. This defect is
    > > is a result of an incorrect buffer size when parsing SMB
    > > replies in the routine receive_smb_raw().
    > >
    > >
    > > ==================
    > > Patch Availability
    > > ==================
    > >
    > > A patch addressing this defect has been posted to
    > >
    > > http://www.samba.org/samba/security/
    > >
    > > Additionally, Samba 3.0.30 has been issued as a security
    > > release to correct the defect. Samba administrators are
    > > advised to upgrade to 3.0.30 or apply the patch as soon
    > > as possible.
    > >
    > >
    > > =======
    > > Credits
    > > =======
    > >
    > > This vulnerability was reported to Samba developers by
    > > Alin Rad Pop, Secunia Research.
    > >
    > > The time line is as follows:
    > >
    > > * May 15, 2008: Initial report to security@samba.org.
    > > * May 15, 2008: First response from Samba developers confirming
    > > the bug along with a proposed patch.
    > > * May 28, 2008: Public security advisory made available.
    > >
    > >
    > > ================================================== ========
    > > == Our Code, Our Bugs, Our Responsibility.
    > > == The Samba Team
    > > ================================================== ========
    > >
    > > -----BEGIN PGP SIGNATURE-----
    > > Version: GnuPG v1.4.6 (GNU/Linux)
    > > Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
    > >
    > > iD8DBQFIPXJ/IR7qMdg1EfYRAue5AKDa9zke1fUfAK8+PkGAHPPI+HOGAgCgyA dy
    > > 95siCUO1D5/qxy4h4qf/flY=
    > > =sf+i
    > > -----END PGP SIGNATURE-----
    > > --
    > > To unsubscribe from this list go to the following URL and read the
    > > instructions: https://lists.samba.org/mailman/listinfo/samba
    > >
    > > --------------------------------------------------------------------

    >

    --
    To unsubscribe from this list go to the following URL and read the
    instructions: https://lists.samba.org/mailman/listinfo/samba

  2. Re: [SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1

    Alexander,

    > Hello Jerry, list,
    >
    > Could someone please provide a bit more information
    > regarding this vulnerability, in terms of what
    > configurations are affected?


    It is in the client SMB response parsing for a specific
    SMB op. There are many places where the client code is used.
    For example, print change notification where smbd has to
    reconnect back to the Windows NT or later client and open
    a socket. Also of course the domain member server
    connections (contacting a DC) as well as simple smbspool
    and smbclient uses.

    This is a pretty important patch for all server configurations
    I believe.

    Hope this helps.




    cheers, jerry
    - --
    ================================================== ===================
    Samba ------- http://www.samba.org
    Likewise Software --------- http://www.likewisesoftware.com
    "What man is a man who does not make the world better?" --Balian
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.4.6 (GNU/Linux)
    Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

    iD8DBQFIPrmlIR7qMdg1EfYRAkOhAKCYFFvUMx5Ieojgj4E14B +owOsDLgCeJZO4
    APPGCs6TbE4ljVBTL5Y6K1Q=
    =z1do
    -----END PGP SIGNATURE-----
    --
    To unsubscribe from this list go to the following URL and read the
    instructions: https://lists.samba.org/mailman/listinfo/samba

+ Reply to Thread