Korean
<< Back
VID 23024
Severity 40
Port 139
Protocol TCP
Class Samba
Detailed Description The Samba server, according to its version number, has a remote file creation vulnerability.
A remote attacker can use a NetBIOS name containing unix path characters which will then be substituted into the %m macro wherever it occurs in smb.conf. This can be used to cause Samba to create a log file on top of an important system file, which in turn can be used to compromise security on the target server.
The most commonly used configuration option that can be vulnerable to this attack is the "log file" option. The default value for this option is VARDIR/log.smbd. If the default is used then Samba is not vulnerable to this attack.
The security hole occurs when a log file option like the following is used:

log file = /var/log/samba/%m.log

In this case the attacker can use a locally created symbolic link to overwrite any file on the system. This requires local access to the server. The attacker can use this flaw to overwrite or append data remotely to the specified file.

* Note: This check item solely relied on the version of the remote Samba server to assess this vulnerability, so this might be a false positive.

* References:
http://online.securityfocus.com/bid/2928
http://www.iss.net/security_center/static/6731.php

Platforms Affected:
- Samba 2.0.9 or prior
- Samba 2.2.0
Recommendation For Conectiva Linux All versions:
Upgrade to the latest version of samba (2.0.9 or later), as listed in Conectiva Linux Security Announcement CLA-2001:405, http://online.securityfocus.com/archive/1/193028

For Debian Linux 2.2 (alias potato):
Upgrade to the latest version of samba (2.0.7-3.4 or later), as listed in Debian Security Advisory DSA-065-1, http://online.securityfocus.com/archive/1/193029

For Red Hat Linux All versions:
Upgrade to the latest version of samba (2.0.10-0.52 or later), as listed in Red Hat, Inc. Red Hat Security Advisory RHSA-2001:086-06, http://www.redhat.com/support/errata/RHSA-2001-086.html

For HP CIFS/9000 Server version A.01.07 and earlier and HP 3000 servers running Samba/iX:
See Hewlett-Packard Company Security Advisory HPSBUX0107-157 for workaround information. http://online.securityfocus.com/advisories/3423

For HP 3000 MPE/iX servers running Samba/iX:
See Hewlett-Packard Company Security Advisory HPSBMP0107-012 for workaround information. http://online.securityfocus.com/archive/1/194699

For SGI IRIX All versions:
Upgrade to the latest version of samba (2.2.1a or later), as listed in SGI Security Advisory 20011002-01-P, ftp://patches.sgi.com/support/free/security/advisories/20011002-01-P

For SuSE Linux All versions:
Upgrade to the latest version of samba (2.0.10-0 or later), as listed in SuSE Security Announcement SuSE-SA:2001:021, http://www.suse.com/de/support/security/2001_021_samba_txt.txt

For FreeBSD FreeBSD Ports Collection prior to 2001-06-23: Upgrade to the latest version of samba (2.0.10 dated 2001-06-23 or later), as listed in FreeBSD-SA-01:45, ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:45.samba.asc

For other distributions:
Contact your vendor for upgrade or patch information, or see Samba Web site, http://us1.samba.org/samba/whatsnew/samba-2.2.1.html
Related URL CVE-2001-1162 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)