[Announce] Samba 4.1.9, 4.0.19 and 3.6.24 Security Releases Available
Karolin Seeger
kseeger at samba.org
Mon Jun 23 03:17:34 MDT 2014
Release Announcements
---------------------
Samba 4.1.9, 4.0.19 and 3.6.24 have been issued as security releases in order
to address CVE-2014-0244 (Denial of service - CPU loop) and
CVE-2014-3493 (Denial of service - Server crash/memory corruption).
For more details/patches, please see
http://www.samba.org/samba/history/security.html
o CVE-2014-0244:
All current released versions of Samba are vulnerable to a denial of
service on the nmbd NetBIOS name services daemon. A malformed packet
can cause the nmbd server to loop the CPU and prevent any further
NetBIOS name service.
This flaw is not exploitable beyond causing the code to loop
expending CPU resources.
o CVE-2014-3493:
All current released versions of Samba are vulnerable to a denial of
service on the smbd file server daemon.
Valid unicode path names stored on disk can cause smbd to
crash if an authenticated client attempts to read them
using a non-unicode request.
The crash is caused by memory being overwritten by
zeros at a 4GB offset from the expected return buffer
area, due to an invalid return code from a bad unicode
to Windows character set conversion.
Currently it is not believed to be exploitable by
an attacker, as there is no way to control the
exact area of memory being overwritten. However,
in the interests of safety this is being treated
Changes:
========
o Jeremy Allison <jra at samba.org>
* BUG 10633: CVE-2014-0244: Fix nmbd denial of service.
* BUG 10654: CVE-2014-3493: Fix segmentation fault in
smbd_marshall_dir_entry()'s SMB_FIND_FILE_UNIX handler.
#######################################
Reporting bugs & Development Discussion
#######################################
Please discuss this release on the samba-technical mailing list or by
joining the #samba-technical IRC channel on irc.freenode.net.
If you do report problems then please try to send high quality
feedback. If you don't provide vital information to help us track down
the problem then you will probably be ignored. All bug reports should
be filed under the Samba correct product in the project's Bugzilla
database (https://bugzilla.samba.org/).
======================================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
======================================================================
================
Download Details
================
The uncompressed tarballs and patch files have been signed
using GnuPG (ID 6568B7EA). The source code can be downloaded
from:
http://download.samba.org/samba/ftp/stable/
The release notes are available online at:
http://www.samba.org/samba/history/samba-4.1.9.html
http://www.samba.org/samba/history/samba-4.0.19.html
http://www.samba.org/samba/history/samba-3.6.24.html
Binary packages will be made available on a volunteer basis from
http://download.samba.org/samba/ftp/Binary_Packages/
Our Code, Our Bugs, Our Responsibility.
(https://bugzilla.samba.org/)
--Enjoy
The Samba Team
More information about the samba-announce
mailing list