Lucene search

K
centosCentOS ProjectCESA-2008:0288
HistoryMay 28, 2008 - 8:10 p.m.

samba security update

2008-05-2820:10:34
CentOS Project
lists.centos.org
63

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.97 High

EPSS

Percentile

99.7%

CentOS Errata and Security Advisory CESA-2008:0288

Samba is a suite of programs used by machines to share files, printers, and
other information.

A heap-based buffer overflow flaw was found in the way Samba clients handle
over-sized packets. If a client connected to a malicious Samba server, it
was possible to execute arbitrary code as the Samba client user. It was
also possible for a remote user to send a specially crafted print request
to a Samba server that could result in the server executing the vulnerable
client code, resulting in arbitrary code execution with the permissions of
the Samba server. (CVE-2008-1105)

Red Hat would like to thank Alin Rad Pop of Secunia Research for
responsibly disclosing this issue.

Users of Samba are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2008-June/077108.html
https://lists.centos.org/pipermail/centos-announce/2008-June/077109.html
https://lists.centos.org/pipermail/centos-announce/2008-June/077110.html
https://lists.centos.org/pipermail/centos-announce/2008-June/077111.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077101.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077102.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077106.html
https://lists.centos.org/pipermail/centos-announce/2008-May/077107.html

Affected packages:
samba
samba-client
samba-common
samba-swat

Upstream details at:
https://access.redhat.com/errata/RHSA-2008:0288

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.97 High

EPSS

Percentile

99.7%