CentOS Errata and Security Advisory CESA-2008:0288
Samba is a suite of programs used by machines to share files, printers, and other information.
A heap-based buffer overflow flaw was found in the way Samba clients handle over-sized packets. If a client connected to a malicious Samba server, it was possible to execute arbitrary code as the Samba client user. It was also possible for a remote user to send a specially crafted print request to a Samba server that could result in the server executing the vulnerable client code, resulting in arbitrary code execution with the permissions of the Samba server. (CVE-2008-1105)
Red Hat would like to thank Alin Rad Pop of Secunia Research for responsibly disclosing this issue.
Users of Samba are advised to upgrade to these updated packages, which contain a backported patch to resolve this issue.
Merged security bulletin from advisories: http://lists.centos.org/pipermail/centos-announce/2008-June/014946.html http://lists.centos.org/pipermail/centos-announce/2008-June/014947.html http://lists.centos.org/pipermail/centos-announce/2008-June/014948.html http://lists.centos.org/pipermail/centos-announce/2008-June/014949.html http://lists.centos.org/pipermail/centos-announce/2008-May/014939.html http://lists.centos.org/pipermail/centos-announce/2008-May/014940.html http://lists.centos.org/pipermail/centos-announce/2008-May/014944.html http://lists.centos.org/pipermail/centos-announce/2008-May/014945.html
Affected packages: samba samba-client samba-common samba-swat
Upstream details at: https://rhn.redhat.com/errata/RHSA-2008-0288.html