| VID |
23080 |
| Severity |
40 |
| Port |
901 |
| Protocol |
TCP |
| Class |
SWAT |
| Detailed Description |
The SWAT server appears to be vulnerable to a buffer overflow vulnerability. Samba ships with a utility titled SWAT (Samba Web Administration Tool) which is used for remote administration of the Samba server and is by default set to run from inetd as root on port 901. The internal routine used by the SWAT in Samba 3.0.2 to 3.0.4 to decode the base64 data during HTTP basic authentication is subject to a buffer overrun caused by an invalid base64 character. This vulnerability allows remote attackers to execute arbitrary code on the affected system.
* References: http://marc.theaimsgroup.com/?l=bugtraq&m=109052647928375&w=2 http://marc.theaimsgroup.com/?l=bugtraq&m=109053195818351&w=2 http://marc.theaimsgroup.com/?l=bugtraq&m=109051340810458&w=2
* Platforms Affected: Samba 3.0.2 to 3.0.4 Linux Any version UNIX Any version |
| Recommendation |
Upgrade to the latest version of Samba (3.0.5 or 2.2.10 or later), available from the Samba Web site at http://samba.org/samba/samba.html
For Red Hat Linux: Upgrade to the latest version of samba, as listed in Red Hat Security Advisory RHSA-2004:259-23 at http://www.redhat.com/support/errata/RHSA-2004-259.html
For Conectiva Linux: Upgrade to the latest samba package by referring to Conectiva Linux Security Announcement CLSA-2004:851 at http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000851
For other distributions: Contact your vendor for patch or upgrade information.
-- OR --
Block access to SWAT service (by default TCP port 901) from untrusted networks. If it is not need, disable SWAT by commenting the relevant /etc/inetd.conf line. |
| Related URL |
CVE-2004-0600 (CVE) |
| Related URL |
10780 (SecurityFocus) |
| Related URL |
(ISS) |
|