Conectiva Linux Advisory: sambaJul 22, 2004, 20:29 (0 Talkback[s])
WEBINAR: On-demand Event
Replace Oracle with the NoSQL Engagement Database: Why and how leading companies are making the switch REGISTER >
CONECTIVA LINUX SECURITY ANNOUNCEMENT
PACKAGE : samba
Evgeny Demidov noticed that the internal routine used by the Samba Web Administration Tool (SWAT) to decode the base64 data during HTTP basic authentication is subject to a buffer overrun caused by an invalid base64 character. This same code is used internally to decode the sambaMungedDial attribute value when using the ldapsam passdb backend and to decode input given to the ntlm_auth tool.
Another buffer overrun problem has been located in the code used to support the 'mangling method = hash' smb.conf option. Please be aware that the default setting for this parameter is 'mangling method
Conectiva Linux versions 8 and 9 are also vulnerable to the second problem and a specific announcement for it is pending.
Detailed instructions regarding the use of apt and upgrade examples can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en
All packages are signed with Conectiva's GPG key. The key and instructions on how to import it can be found at
http://distro.conectiva.com.br/seguranca/chave/?idioma=en Instructions on how to check the signatures of the RPM packages can be found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
All our advisories and generic update instructions can be viewed at http://distro.conectiva.com.br/atualizacoes/?idioma=en
Copyright (c) 2004 Conectiva Inc.
0 Talkback[s] (click to add your comment)