Note: This is an archival copy of Security Sun Alert 201487 as previously published on http://sunsolve.sun.com.|
Latest version of this security advisory is available from http://support.oracle.com as Sun Alert 1001112.1.
Solaris 9 Operating System
Date of Workaround Release
Date of Resolved Release
Several buffer overflows have been found in Samba(7), at least one of which may allow a remote unprivileged user to execute arbitrary code with the privileges of the Super User (typically root), on a Solaris 9 system running as a Samba(7) server.
This issue can occur in the following releases:
Only systems configured as Samba servers running Samba versions 2.0.x through 2.2.8 are vulnerable to this issue. To determine if a system is configured as a Samba server the following command can be run:
% ls -l /etc/sfw/smb.conf
To determine the version of Samba installed, the following command can be run:
% /usr/sfw/sbin/smbd -V
Note: Solaris 2.6, 7, and 8 do not include the Samba software and are not affected by this issue. Sun does include Samba on the Solaris Companion CD for Solaris 8 as an unsupported package which installs to /opt/sfw and is vulnerable to this issue. Sites using the freeware version of Samba from the Solaris Companion CD will have to upgrade to a later version from Samba.org.
There are no predictable symptoms that would show the described issue has been exploited to gain root privileges.
Workaround information can be found in the "Protecting an unpatched Samba server" section from the Samba Team announcement for version 2.2.8 at: http://www.samba.org/samba/whatsnew/samba-2.2.8.html.
This issue is addressed in the following releases:
This solution has no attachment