samba vulnerability

Related Vulnerabilities: CVE-2010-0926  

It was discovered the Samba handled symlinks in an unexpected way when both “wide links” and “UNIX extensions” were enabled, which is the default. A remote attacker could create symlinks and access arbitrary files from the server.

The problem can be corrected by updating your system to the following package versions:

24 March 2010

samba vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.10
  • Ubuntu 8.04 LTS
  • Ubuntu 6.06 LTS

Software Description

  • samba

Details

It was discovered the Samba handled symlinks in an unexpected way when both “wide links” and “UNIX extensions” were enabled, which is the default. A remote attacker could create symlinks and access arbitrary files from the server.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 9.10
samba - 2:3.4.0-3ubuntu5.6
Ubuntu 9.04
samba - 2:3.3.2-1ubuntu3.4
Ubuntu 8.10
samba - 2:3.2.3-1ubuntu3.8
Ubuntu 8.04 LTS
samba - 3.0.28a-1ubuntu4.11
Ubuntu 6.06 LTS
samba - 3.0.22-1ubuntu3.11

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system upgrade is sufficient to effect the necessary changes.

ATTENTION: This update changes the default samba behaviour. For security reasons, it is no longer possible to use wide links and UNIX extensions at the same time. After applying this security update, wide links will be disabled automatically as UNIX extensions are turned on by default. If wide links are required, you can re-enable them by adding “unix extensions = no” to the [global] section of the /etc/samba/smb.conf configuration file.

References