[Trisquel-security] [USN-1423-1] Samba vulnerability

Tyler Hicks tyhicks at canonical.com
Fri Apr 13 02:28:47 CEST 2012

Ubuntu Security Notice USN-1423-1
April 13, 2012

samba vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 11.10
- Ubuntu 11.04
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS


Samba could be made to run programs as the administrator if it received
specially crafted network traffic.

Software Description:
- samba: SMB/CIFS file, print, and login server for Unix


Brian Gorenc discovered that Samba incorrectly calculated array bounds when
handling remote procedure calls (RPC) over the network. A remote,
unauthenticated attacker could exploit this to execute arbitrary code as the
root user. (CVE-2012-1182)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 11.10:
  samba                           2:3.5.11~dfsg-1ubuntu2.2

Ubuntu 11.04:
  samba                           2:3.5.8~dfsg-1ubuntu2.4

Ubuntu 10.04 LTS:
  samba                           2:3.4.7~dfsg-1ubuntu3.9

Ubuntu 8.04 LTS:
  samba                           3.0.28a-1ubuntu4.18

In general, a standard system update will make all the necessary changes.


Package Information:

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://listas.trisquel.info/pipermail/trisquel-security/attachments/20120412/470ca2c8/attachment.pgp>
-------------- next part --------------
ubuntu-security-announce mailing list
ubuntu-security-announce at lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

More information about the Trisquel-security mailing list