Bug 5336 - CVE-2012-1182: samba remote vulnerability that allows remote code execution as the "root" user
Summary: CVE-2012-1182: samba remote vulnerability that allows remote code execution a...
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 1
Hardware: i586 Linux
Priority: Normal critical
Target Milestone: ---
Assignee: QA Team
QA Contact:
URL:
Whiteboard:
Keywords: validated_update
: 5353 (view as bug list)
Depends on:
Blocks:
 
Reported: 2012-04-10 20:51 CEST by Nicolas Vigier
Modified: 2012-04-11 16:44 CEST (History)
6 users (show)

See Also:
Source RPM: samba
CVE:
Status comment:


Attachments

Description Nicolas Vigier 2012-04-10 20:51:38 CEST
This affect versions in Mageia 1 and cauldron :
https://www.samba.org/samba/security/CVE-2012-1182
Comment 1 Pascal Terjan 2012-04-10 22:42:06 CEST
samba-3.5.8-1.2.mga1 was submitted to updates_testing for 1

samba-3.6.4 for Cauldron needs to go through version freeze

CC: (none) => pterjan
Assignee: bgmilne => qa-bugs

Comment 2 David Walser 2012-04-11 01:22:58 CEST
Advisory:
========================

Updated samba packages fix security vulnerability:

A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler,
used to generate code to handle RPC calls, resulted in multiple
buffer overflows in Samba. A remote, unauthenticated attacker could
send a specially-crafted RPC request that would cause the Samba
daemon (smbd) to crash or, possibly, execute arbitrary code with
the privileges of the root user (CVE-2012-1182).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182
https://www.samba.org/samba/security/CVE-2012-1182
https://rhn.redhat.com/errata/RHSA-2012-0465.html
========================

Updated packages in core/updates_testing:
========================
samba-server-3.5.8-1.2.mga1
samba-client-3.5.8-1.2.mga1
samba-common-3.5.8-1.2.mga1
samba-doc-3.5.8-1.2.mga1
samba-swat-3.5.8-1.2.mga1
samba-winbind-3.5.8-1.2.mga1
nss_wins-3.5.8-1.2.mga1
libsmbclient0-3.5.8-1.2.mga1
libsmbclient0-devel-3.5.8-1.2.mga1
libsmbclient0-static-devel-3.5.8-1.2.mga1
libnetapi0-3.5.8-1.2.mga1
libnetapi-devel-3.5.8-1.2.mga1
libsmbsharemodes0-3.5.8-1.2.mga1
libsmbsharemodes-devel-3.5.8-1.2.mga1
libwbclient0-3.5.8-1.2.mga1
libwbclient-devel-3.5.8-1.2.mga1
mount-cifs-3.5.8-1.2.mga1
samba-domainjoin-gui-3.5.8-1.2.mga1

from samba-3.5.8-1.2.mga1.src.rpm

CC: (none) => luigiwalser

Comment 3 Dave Hodgins 2012-04-11 04:05:52 CEST
Testing complete on i586 for the srpm
samba-3.5.8-1.2.mga1.src.rpm

Successfully accessed a share from my host system using the
lxde file manager in a VirtualBox guest with both the host
and the server using the updates, with the url

smb://MYWORKGROUP;dave@192.168.10.101/homes

192.168.10.101 is the ip of the host.

CC: (none) => davidwhodgins

Comment 4 Dave Hodgins 2012-04-11 04:32:59 CEST
Just fyi, I also managed to add the share permanently following
https://wiki.ubuntu.com/MountWindowsSharesPermanently
Comment 5 Manuel Hiebel 2012-04-11 13:22:38 CEST
Testing with the network of my university, sharing file between some laptops. OK


Suggested Advisory:
-------------
Updated samba packages fix security vulnerability:

A flaw in the Samba suite's Perl-based DCE/RPC IDL (PIDL) compiler,
used to generate code to handle RPC calls, resulted in multiple
buffer overflows in Samba. A remote, unauthenticated attacker could
send a specially-crafted RPC request that would cause the Samba
daemon (smbd) to crash or, possibly, execute arbitrary code with
the privileges of the root user (CVE-2012-1182).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182
https://www.samba.org/samba/security/CVE-2012-1182
https://rhn.redhat.com/errata/RHSA-2012-0465.html

https://bugs.mageia.org/show_bug.cgi?id=5336
-------------

SRPM: samba-3.5.8-1.2.mga1.src.rpm

Could sysadmin please push from core/updates_testing to core/updates

Thankyou!

Keywords: (none) => validated_update
CC: (none) => sysadmin-bugs

Comment 6 Derek Jennings 2012-04-11 13:33:15 CEST
Confirmed validated on x86_64

CC: (none) => derekjenn

Comment 7 Nicolas Vigier 2012-04-11 14:52:48 CEST
Update pushed.

Status: NEW => RESOLVED
Resolution: (none) => FIXED

Comment 8 Marja Van Waes 2012-04-11 16:44:35 CEST
*** Bug 5353 has been marked as a duplicate of this bug. ***

CC: (none) => marja11


Note You need to log in before you can comment on or make changes to this bug.