The OpenNET Project
 
Search (keywords):  SOFT ARTICLES TIPS & TRICKS SECURITY
LINKS NEWS MAN DOCUMENTATION


[SAMBA-SECURITY] CVE-2007-2444: Local SID/Name Translation Failure


<< Previous INDEX Search src / Print Next >>
Date: Sun, 13 May 2007 17:48:28 -0500
From: "Gerald (Jerry) Carter" <jerry@samba.org.>
To: [email protected]
Subject: [SAMBA-SECURITY] CVE-2007-2444: Local SID/Name Translation Failure
 Can Result in User Privilege Elevation
X-Enigmail-Version: 0.94.2.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
X-Virus-Scanned: antivirus-gw at tyumen.ru

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


== == Subject: Local SID/Name translation bug can result == in user privilege elevation == CVE ID#: CVE-2007-2444 == == Versions: Samba 3.0.23d - 3.0.25pre2 (inclusive) == == Summary: A bug in the local SID/Name translation == routines may potentially result in a user == being able to issue SMB/CIFS protocol == operations as root. ==
=========== Description =========== When translating SIDs to/from names using Samba local list of user and group accounts, a logic error in the smbd daemon's internal security stack may result in a transition to the root user id rather than the non-root user. The user is then able to temporarily issue SMB/CIFS protocol operations as the root user. This window of opportunity may allow the attacker to establish additional means of gaining root access to the server.
Patch Availability
A patch against Samba 3.0.23d/3.0.24 has posted at http://www.samba.org/samba/security/ ========== Workaround ========== There is no immediate workaround for this defect that does not involve changing the server code in the smbd daemon. The Samba Team always encourages users to run the latest stable release as a defense against attacks. If this is not immediately possible, administrators should read the "Server Security" documentation found at http://www.samba.org/samba/docs/server_security.html ======= Credits ======= This vulnerability was reported to Samba developers by Paul Griffith <paulg@cse.yorku.ca.> and Andrew Hogue. Much thanks to Paul and Andrew for their cooperation and patience in the announcement of this defect. Thanks also to Samba developers James Peach and Jeremy Allison for the analysis and resolution of this issue. The time line is as follows: * March 20, 2007: Defect first reported to the [email protected] email alias. * March 30, 2007: Initial developer response by Gerald Carter. * April 4, 2007: Patch released to bug reporter for testing. * April 9, 2007: Fixed confirmed by original reporter. * May 3, 2007: Announcement to vendor-sec mailing list * May 14, 2007: Public announcement of the security issue.
== Our Code, Our Bugs, Our Responsibility. == The Samba Team
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFGR5W7IR7qMdg1EfYRAsv9AJ9KfUWTcyiDhLEDeIKJFGXaAWvk1gCff+0j FFgPmJhGBosBPSadj+bPpgw= =ruFz -----END PGP SIGNATURE-----

<< Previous INDEX Search src / Print Next >>



Партнёры:
PostgresPro
Inferno Solutions
Hosting by Hoster.ru
Хостинг:

Закладки на сайте
Проследить за страницей
Created 1996-2025 by Maxim Chirkov
Добавить, Поддержать, Вебмастеру