|Reported by:||Owned by:|
It has been confirmed that previous versions of Samba 3.0 are susceptible to a password initialization bug that could grant an attacker unauthorized access to a user account created by the mksmbpasswd.sh shell script.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2004-0082 to this issue.
Samba administrators not wishing to upgrade to the current version should download the 3.0.2 release, build the pdbedit tool, and run
~ root# pdbedit-3.0.2 --force-initialized-passwords
This will disable all accounts not possessing a valid password (e.g. the password field has been set a string of X's).
Samba servers running 3.0.2 are not vulnerable to this bug regardless of whether or not pdbedit has been used to sanitize the passdb backend.
Additionally, some of the more visible bugs in 3.0.1 addressed in the 3.0.2 release include:
~ o Joining a Samba domain from Pre-SP2 Windows 2000 clients. ~ o Logging onto a Samba domain from Windows XP clients. ~ o Problems with the %U and %u smb.conf variables in relation ~ to Windows 9x/ME clients. ~ o Kerberos failures due to an invalid in memory keytab ~ detection test. ~ o Updates to the ntlm_auth tool. ~ o Fixes for various SMB signing errors. ~ o Better separation of WINS and DNS queries for domain ~ controllers. ~ o Issues with nss_winbind FreeBSD and Solaris. ~ o Several crash bugs in smbd and winbindd. ~ o Output formatting fixes for smbclient for better ~ compatibility with scripts based on the 2.2 version.
Change History (10)
comment:4 by , 18 years ago
|Summary:||samba-3.0.2 → Samba-3.0.2a|