Slackware: samba Buffer overflow vulnerability
Summary
Here are the details from the Slackware 8.1 ChangeLog: Sat Mar 15 13:49:04 PST 2003 patches/packages/samba-2.2.8-i386-1.tgz: Upgraded to Samba 2.2.8. From the Samba web site: * (14th Mar, 2003) Security Release - Samba 2.2.8 A flaw has been detected in the Samba main smbd code which could allow an external attacker to remotely and anonymously gain Super User (root) privileges on a server running a Samba server. This flaw exists in previous versions of Samba from 2.0.x to 2.2.7a inclusive. This is a serious problem and all sites should either upgrade to Samba 2.2.8 immediately or prohibit access to TCP ports 139 and 445. (* Security fix *) More information may be found in the Samba release notes. WHERE TO FIND THE NEW PACKAGES: Updated Samba package for Slackware 8.1: Updated Samba package for Slackware -current: MD5 SIGNATURES: Here are the md5sums for the packages: Slackware 8.1 package: be4bee0ed2c50e9313150843e41b09a...
Where Find New Packages
MD5 Signatures
Installation Instructions