Samba smbmnt allows elevated privileges

samba-smbmnt-gain-privileges (15131) The risk level is classified as HighHigh Risk

Description:

Samba could allow a local attacker to gain elevated privileges on the system, caused by a vulnerability in the smbmnt binary configuration. The smbmnt binary is configured with set user id (setuid) root privileges. If a local attacker has access to a remote Samba server, the attacker can use smbmnt to mount the server to the attacker's computer. The attacker can then execute a setuid binary on the remote Samba server to gain elevated privileges, including root.


Consequences:

Gain Access

Remedy:

For Debian GNU/Linux 3.0 (woody):
Upgrade to the latest samba package (2.2.3a-13 or later), as listed in DSA-463-1. See References.

For Mandrake Linux:
Upgrade to the latest samba package, as listed below. Refer to MandrakeSoft Security Advisory MDKSA-2004:035 : samba for more information. See References.

Mandrake Linux 9.1: 2.2.7a-9.3.91mdk or later
Mandrake Linux 9.2: 2.2.8a-13.1.92mdk or later
Mandrake Linux Multi Network Firewall 8.2: 2.2.7a-9.3.M82mdk or later
Mandrake Linux Corporate Server 2.1: 2.2.7a-10.1.C21mdk or later

For Gentoo Linux:
Upgrade to the latest version of samba (3.0.2a-r2 or later), as listed in GLSA 200404-21. See References.

For Turbolinux:
Upgrade to the latest samba package, as listed below. Refer to Turbolinux Security Advisory TLSA-2004-25 for more information. See References.

Turbolinux Appliance Server 1.0 Hosting Edition and Turbolinux Appliance Server 1.0 Workgroup Edition: 2.2.7a-9jaJP or later
Turbolinux 10 Desktop: 2.2.7a-9jaJP or later
Turbolinux 8 Server and workstation, and 7 Server and workstation:2.2.7a-9jaJP or later

For other distributions:
Contact your vendor for upgrade or patch information.

References:

  • BugTraq Mailing List, Mon Feb 09 2004 - 15:23:03 CST : Samba 3.x + kernel 2.6.x local root vulnerability.
  • GLSA 200404-21: Multiple Vulnerabilities in Samba.
  • BID-9619: Linux Kernel Samba Share Local Privilege Elevation Vulnerability
  • CVE-2004-0186: smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted.
  • DSA-463: samba -- privilege escalation
  • GLSA-200404-21: Multiple Vulnerabilities in Samba
  • MDKSA-2004:035: Updated samba packages fix privilege escalation vulnerability
  • OSVDB ID: 3916: Samba smbmnt Local Privilege Escalation

Platforms Affected:

  • Debian Debian Linux 3.0
  • Gentoo Linux
  • MandrakeSoft Mandrake Linux 9.1 PPC
  • MandrakeSoft Mandrake Linux 9.1
  • MandrakeSoft Mandrake Linux 9.2
  • MandrakeSoft Mandrake Linux 9.2 AMD64
  • MandrakeSoft Mandrake Linux Corporate Server 2.1 X86_64
  • MandrakeSoft Mandrake Linux Corporate Server 2.1
  • MandrakeSoft Mandrake Multi Network Firewall 8.2
  • Samba Samba 2.0
  • Samba Samba 3.0.0
  • Turbolinux Turbolinux 10 Desktop
  • Turbolinux Turbolinux 10 F...
  • Turbolinux Turbolinux 7 Server
  • Turbolinux Turbolinux 7 Workstation
  • Turbolinux Turbolinux 8 Server
  • Turbolinux Turbolinux 8 Workstation
  • Turbolinux Turbolinux Appliance Server 1.0
  • Turbolinux Turbolinux Appliance Server 1.0 Hosting Ed
  • Turbolinux Turbolinux Appliance Server 1.0 Workgroup Ed

Reported:

Feb 10, 2004

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page