=====================================================================
                                  CERT-Renater

                       Note d'Information No. 2005/VULN060
_____________________________________________________________________

DATE                      : 08/02/2005

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Solaris 9 running Samba Versions Prior to 3.0.10.

======================================================================

    Sun(sm) Alert Notification
      * Sun Alert ID: 57730
      * Synopsis: Security Vulnerability in Samba(7) Versions Prior to
        3.0.10 May Allow Unauthorized Root Privileges
      * Category: Security
      * Product: Solaris
      * BugIDs: 6217228
      * Avoidance: Workaround
      * State: Committed
      * Date Released: 24-Jan-2005
      * Date Closed:
      * Date Modified:

    1. Impact An integer overflow security issue with the Samba(7)
    smbd(1m) daemon may allow a local or remote authenticated user the
    ability to execute arbitrary commands with the privileges of Super
    User (typically root), on a Solaris 9 system running as a Samba(7)
    server.

    More information on this issue is available at:

      * CERT Vulnerability Note VU#226184 at:
        [2]http://www.kb.cert.org/vuls/id/226184
      * CVE CAN-2004-1154 at:
        [3]http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154
      * Samba Security Announcement at:
        [4]http://www.samba.org/samba/security/CAN-2004-1154.html

    2. Contributing Factors This issue can occur in the following
    releases:

    SPARC Platform

      * Solaris 9

    x86 Platform

      * Solaris 9

    Note: Solaris 7 and Solaris 8 do not include the Samba software and
    are not affected by this issues. Sun does include Samba on the Solaris
    Companion CD for Solaris 8 as an unsupported package which installs to
    "/opt/sfw" and is vulnerable to this issue. Sites using the freeware
    version of Samba from the Solaris Companion CD will need to upgrade to
    a later version from Samba.org.

    This issue only occurs if all of the following conditions are true:

      * The system is configured as a Samba server
      * The version of Samba installed is 2.X through 3.0.9

    To determine if a system is configured as a Samba server, use the
    following command to check for the presence of the smb.conf(4) file:

     % ls -l /etc/sfw/smb.conf
     -rw-r--r--   1 root  other  11665 Sep 28 16:37 /etc/sfw/smb.conf


    If the output is similar to that shown above, the system is configured
    as a Samba server.

    To determine the version of Samba installed on a system, the following
    command can be run:

     % /usr/sfw/sbin/smbd -V
     Version  3.0.4

    3. Symptoms Unsuccessful exploitation attempts may leave evidence of
    an attack in system logs.

    Solution Summary [5]Top

    4. Relief/Workaround To work around the described issue, download and
    compile samba 3.0.10 or higher from Samba.org

    Follow the security suggestions from the samba team at:
    [6]http://www.samba.org/samba/docs/server_security.html.

    5. Resolution A final resolution is pending completion.

    This Sun Alert notification is being provided to you on an "AS IS"
    basis. This Sun Alert notification may contain information provided by
    third parties. The issues described in this Sun Alert notification may
    or may not impact your system(s). Sun makes no representations,
    warranties, or guarantees as to the information contained herein. ANY
    AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
    WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
    NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT
    YOU ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
    INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE
    OUT OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN.
    This Sun Alert notification contains Sun proprietary and confidential
    information. It is being provided to you pursuant to the provisions of
    your agreement to purchase services from Sun, or, if you do not have
    such an agreement, the Sun.com Terms of Use. This Sun Alert
    notification may only be used for the purposes contemplated by these
    agreements.

    Copyright 2000-2005 Sun Microsystems, Inc., 4150 Network Circle, Santa
    Clara, CA 95054 U.S.A. All rights reserved.

References

    1. http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-57730-1#top
    2. http://www.kb.cert.org/vuls/id/226184
    3. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1154
    4. http://www.samba.org/samba/security/CAN-2004-1154.html
    5. http://sunsolve.sun.com/search/printfriendly.do?assetkey=1-26-57730-1#top
    6. http://www.samba.org/samba/docs/server_security.html

======================================================================

         =========================================================
         Les serveurs de référence du CERT-Renater
         http://www.urec.fr/securite
         http://www.cru.fr/securite
         http://www.renater.fr
         =========================================================
         + CERT-RENATER          | tel : 01-53-94-20-44          +
         + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
         + 75013 Paris           | email: certsvp@renater.fr     +
         =========================================================








