Skip to navigation

Security Advisory Critical: samba security update

Advisory: RHSA-2012:0478-1
Type: Security Advisory
Severity: Critical
Issued on: 2012-04-13
Last updated on: 2012-04-13
Affected Products: Red Hat Enterprise Linux ELS (v. 4)
CVEs (cve.mitre.org): CVE-2012-1182

Details

Updated samba packages that fix one security issue are now available for
Red Hat Enterprise Linux 4 Extended Life Cycle Support.

The Red Hat Security Response Team has rated this update as having critical
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Samba is an open-source implementation of the Server Message Block (SMB) or
Common Internet File System (CIFS) protocol, which allows PC-compatible
machines to share files, printers, and other information.

A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler, used
to generate code to handle RPC calls, resulted in multiple buffer overflows
in Samba. A remote, unauthenticated attacker could send a specially-crafted
RPC request that would cause the Samba daemon (smbd) to crash or, possibly,
execute arbitrary code with the privileges of the root user.
(CVE-2012-1182)

Users of Samba are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing this
update, the smb service will be restarted automatically.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux ELS (v. 4)

SRPMS:
samba-3.0.33-3.36.el4.src.rpm     MD5: 9ef94619484a80d916d2c14d3f0078ea
SHA-256: 75fcf734f1b65c9f46b83e741181c5cd4c76e5d03509c162a4d2dd9814ceae35
 
IA-32:
samba-3.0.33-3.36.el4.i386.rpm     MD5: 0e6be6183f19ed0648ff9e5dd31784a8
SHA-256: 9c08438c35381da9f3c476644c8e863b7e4af532088b92a4ea1cd8272fe9fa6b
samba-client-3.0.33-3.36.el4.i386.rpm     MD5: 7401bf35b2663803aa9386f165c33de9
SHA-256: 668382930d877f92724000a27cd73c160c7c583fd4d8d0214370d68691b31d89
samba-common-3.0.33-3.36.el4.i386.rpm     MD5: 615cd46e7571b0d0c1d211261b4c8e2d
SHA-256: 3ae9a72f1a6e49def5a4f0222582c8ec9f41faf7f26f60b2001440d0282e17a1
samba-swat-3.0.33-3.36.el4.i386.rpm     MD5: 8dc1965560635e264d666ee01126bf51
SHA-256: 61cd1f068f03442903b21044d6023a4a3aead6e22ce2a0d6023346c093afd63e
 
IA-64:
samba-3.0.33-3.36.el4.ia64.rpm     MD5: ef3bba89bb5991f4c33287b004ac6c47
SHA-256: e539fd6f412a9c43d21080cc86ba6e8d665955ab08e346be5ac4a1ec69025db1
samba-client-3.0.33-3.36.el4.ia64.rpm     MD5: ee82d4ba3cb919c0872cf3c34b329447
SHA-256: b3a6e48847b681a082e070f2f564ae38a9a27ff67a5af03036408b3a751b8c96
samba-common-3.0.33-3.36.el4.i386.rpm     MD5: 615cd46e7571b0d0c1d211261b4c8e2d
SHA-256: 3ae9a72f1a6e49def5a4f0222582c8ec9f41faf7f26f60b2001440d0282e17a1
samba-common-3.0.33-3.36.el4.ia64.rpm     MD5: 42553b1020b8489a61a97b4bd5a2e65b
SHA-256: ceda775688fbc2421e83a1dcf54da9035232c1bd2e560f6ae301b84ec39c9eb0
samba-swat-3.0.33-3.36.el4.ia64.rpm     MD5: 332db16dfd0d22683d2a83df9d757bd4
SHA-256: 5991aeb13822b39435df8c949fe228f4442bc48fc9fc8f52c483353071ceaf42
 
x86_64:
samba-3.0.33-3.36.el4.x86_64.rpm     MD5: b35826702638c56eb02089e35ba10c69
SHA-256: 047ea6cbbb2e6e0aad034536234c67e02e097dc3f1eea4e77118b039b07503ed
samba-client-3.0.33-3.36.el4.x86_64.rpm     MD5: c064c4d2c928358d82c41dd7452a864e
SHA-256: a617bab8e42b0f05017a134bfc771f3bdd469501a9ebb2265728cc5a394c4551
samba-common-3.0.33-3.36.el4.i386.rpm     MD5: 615cd46e7571b0d0c1d211261b4c8e2d
SHA-256: 3ae9a72f1a6e49def5a4f0222582c8ec9f41faf7f26f60b2001440d0282e17a1
samba-common-3.0.33-3.36.el4.x86_64.rpm     MD5: 861151c846af6913080dfb263eaddb58
SHA-256: d2f9091c4f6335547fa8c8d0cf96b8eedce00c14bb093cbea7ed0dce71696db8
samba-swat-3.0.33-3.36.el4.x86_64.rpm     MD5: c439a54030e90752aec940f61ef87d33
SHA-256: 5ecad8849005ac89faf4dc5bf67e33c989c987f736e3a9db04eaea1dce0ea552
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

804093 - CVE-2012-1182 samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/