Re: Samba 'smbprint' script tmpfile vulnerability.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

For the record, Shaun Colley first email <security@samba.org>
on "Thu, 18 Mar 2004 20:21:48 +0000 (GMT)".  The set of core
Samba developers were given no prior notice that the potential
bug would be published on BUGtraq.  Nor we were notified when
the announcement was sent.

Samba developers were in the process of completing their analysis
when this occurred.

Now onto the response....


Product:      Samba 'smbprint' script.
              http://www.samba.org

Versions: All versions, but manifesting in different ways.

Please be aware that Shaun's report applies to the smbprint-new.sh script included in the examples/ directory of the Samba 3.0.2a distribution. No other version of smbprint included in the packaging/ directory possess this flaw.

The Samba Team has no control over what individual package
maintainers or distributors include in their packages.  As
Shaun has pointed out the version of samba packaged by with
Mandrake 9.0 may be vulnerable to such a symlink attack as
described here.  This fact has not been confirmed by Samba
developers.

Bug: Symlink bug / tmpfile bug.
...
I have located a bug in older versions of the smbprint
script, and also a less likely one in the new version
(packaged with 3.0.2a and maybe earlier).  These

My comments apply to both the Samba 2.2.8a release as well as the current 3.0.x series.

The script in question is included in the current 3.0.2a
release in samba-3.0.2a/examples/printing/smbprint-new.sh.
Source code, utilities, and documentation included in the
examples/ portion of the Samba source tree are contributed
by the Samba community as possibilities of how a given task
may be achieved.

They are *examples* only and not to be considered part of
the core Samba client or server product.

Therefore, while the possibility of the symlink attack that
Shaun describes is real, it should be stressed that

  (a) smbprint-new.sh is an example script only.  Users
      or administrators may do whatever they see fit.
  (b) the default behavior of the script is to log debug
      output to /dev/null and is therefore not vulnerable
      to the symlink attack.
  (c) the administrator must have enabled the debug option
      in the matching .config file as well not overriding
      the default debugfile setting.


Details
########

1) Older versions of smbprint - tmpfile vulnerability.
--

Without know which specific packages or versions that to which Shaun is referring, it is impossible to address this statement. See the above statement regarding the 2.2.8a release and the 3.0.x series.

--- /usr/bin/smbprint ---
[...]
logfile=/tmp/smb-print.log

This is not the default option in the versions of the smbprint script that I have been able to locate. The line in question has been commented out in the version of smbprint that are included in the packaging/ directory of the Samba source tree.

2) Newest version of smbprint - tmpfile vulnerability
....Here is a sample config file on
a system which is vulnerable:

--- .config ---
user="username"
server=server
service=printer
password=""
debug=yes
--- EOF ---

This is the smbprint-new.sh script contained in examples/printing/. The debug option is not required, and as stated previously, not enabled by default.

Solution
#########

I've tried to provide workarounds.  Maybe bug 2) will
be fixed in the next stable release of Samba.

In summary, the Samba Team is labeling this as a bug and not a security hole due to the fact that it is only an example. We will however, ensure that the bug is fixed before the next official release (i.e. Samba 3.0.3).







cheers, jerry
Samba Release Manager
- ----------------------------------------------------------------------
Hewlett-Packard            ------------------------- http://www.hp.com
SAMBA Team                 ---------------------- http://www.samba.org
GnuPG Key                  ---- http://www.plainjoe.org/gpg_public.asc
"If we're adding to the noise, turn off this song" --Switchfoot (2003)
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFAW+CEIR7qMdg1EfYRAr+KAJ9v7vXV2DQh0IZgl3EsRH6/XAMu+wCg0aXe
WtdPvh+A98loLYSAAkTZ254=
=hTfA
-----END PGP SIGNATURE-----

[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux