rhsa-2007_1017
Vulnerability from csaf_redhat
Published
2007-11-15 16:29
Modified
2024-11-22 01:34
Summary
Red Hat Security Advisory: samba security update
Notes
Topic
Updated samba packages that fix security issues are now available for Red
Hat Enterprise Linux 5.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
Samba is a suite of programs used by machines to share files, printers, and
other information.
A buffer overflow flaw was found in the way Samba creates NetBIOS replies.
If a Samba server is configured to run as a WINS server, a remote
unauthenticated user could cause the Samba server to crash or execute
arbitrary code. (CVE-2007-5398)
A heap based buffer overflow flaw was found in the way Samba authenticates
users. A remote unauthenticated user could trigger this flaw to cause the
Samba server to crash. Careful analysis of this flaw has determined that
arbitrary code execution is not possible, and under most circumstances will
not result in a crash of the Samba server. (CVE-2007-4572)
A flaw was found in the way Samba assigned group IDs under certain
conditions. If the "winbind nss info" parameter in smb.conf is set to
either "sfu" or "rfc2307", Samba users are incorrectly assigned the group
ID of 0. (CVE-2007-4138)
Red Hat would like to thank Alin Rad Pop of Secunia Research, Rick King,
and the Samba developers for responsibly disclosing these issues.
All Samba users are advised to upgrade to these updated packages, which
contain a backported patch to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated samba packages that fix security issues are now available for Red\nHat Enterprise Linux 5.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "Samba is a suite of programs used by machines to share files, printers, and\nother information.\n\nA buffer overflow flaw was found in the way Samba creates NetBIOS replies.\nIf a Samba server is configured to run as a WINS server, a remote\nunauthenticated user could cause the Samba server to crash or execute\narbitrary code. (CVE-2007-5398)\n\nA heap based buffer overflow flaw was found in the way Samba authenticates\nusers. A remote unauthenticated user could trigger this flaw to cause the\nSamba server to crash. Careful analysis of this flaw has determined that\narbitrary code execution is not possible, and under most circumstances will\nnot result in a crash of the Samba server. (CVE-2007-4572)\n\nA flaw was found in the way Samba assigned group IDs under certain\nconditions. If the \"winbind nss info\" parameter in smb.conf is set to\neither \"sfu\" or \"rfc2307\", Samba users are incorrectly assigned the group\nID of 0. (CVE-2007-4138)\n\nRed Hat would like to thank Alin Rad Pop of Secunia Research, Rick King,\nand the Samba developers for responsibly disclosing these issues.\n\nAll Samba users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2007:1017", "url": "https://access.redhat.com/errata/RHSA-2007:1017" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "286271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=286271" }, { "category": "external", "summary": "294631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=294631" }, { "category": "external", "summary": "358831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358831" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_1017.json" } ], "title": "Red Hat Security Advisory: samba security update", "tracking": { "current_release_date": "2024-11-22T01:34:19+00:00", "generator": { "date": "2024-11-22T01:34:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2007:1017", "initial_release_date": "2007-11-15T16:29:00+00:00", "revision_history": [ { "date": "2007-11-15T16:29:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2007-11-15T11:29:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T01:34:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "samba-client-0:3.0.25b-1.el5_1.2.x86_64", "product": { "name": "samba-client-0:3.0.25b-1.el5_1.2.x86_64", "product_id": "samba-client-0:3.0.25b-1.el5_1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-client@3.0.25b-1.el5_1.2?arch=x86_64" } } }, { "category": "product_version", "name": "samba-swat-0:3.0.25b-1.el5_1.2.x86_64", "product": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.x86_64", "product_id": "samba-swat-0:3.0.25b-1.el5_1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-swat@3.0.25b-1.el5_1.2?arch=x86_64" } } }, { "category": "product_version", "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "product": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "product_id": "samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debuginfo@3.0.25b-1.el5_1.2?arch=x86_64" } } }, { "category": "product_version", "name": "samba-common-0:3.0.25b-1.el5_1.2.x86_64", "product": { "name": "samba-common-0:3.0.25b-1.el5_1.2.x86_64", "product_id": "samba-common-0:3.0.25b-1.el5_1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-common@3.0.25b-1.el5_1.2?arch=x86_64" } } }, { "category": "product_version", "name": "samba-0:3.0.25b-1.el5_1.2.x86_64", "product": { "name": "samba-0:3.0.25b-1.el5_1.2.x86_64", "product_id": "samba-0:3.0.25b-1.el5_1.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba@3.0.25b-1.el5_1.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "product": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "product_id": "samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debuginfo@3.0.25b-1.el5_1.2?arch=i386" } } }, { "category": "product_version", "name": "samba-common-0:3.0.25b-1.el5_1.2.i386", "product": { "name": "samba-common-0:3.0.25b-1.el5_1.2.i386", "product_id": "samba-common-0:3.0.25b-1.el5_1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-common@3.0.25b-1.el5_1.2?arch=i386" } } }, { "category": "product_version", "name": "samba-client-0:3.0.25b-1.el5_1.2.i386", "product": { "name": "samba-client-0:3.0.25b-1.el5_1.2.i386", "product_id": "samba-client-0:3.0.25b-1.el5_1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-client@3.0.25b-1.el5_1.2?arch=i386" } } }, { "category": "product_version", "name": "samba-swat-0:3.0.25b-1.el5_1.2.i386", "product": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.i386", "product_id": "samba-swat-0:3.0.25b-1.el5_1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-swat@3.0.25b-1.el5_1.2?arch=i386" } } }, { "category": "product_version", "name": "samba-0:3.0.25b-1.el5_1.2.i386", "product": { "name": "samba-0:3.0.25b-1.el5_1.2.i386", "product_id": "samba-0:3.0.25b-1.el5_1.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba@3.0.25b-1.el5_1.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "samba-0:3.0.25b-1.el5_1.2.src", "product": { "name": "samba-0:3.0.25b-1.el5_1.2.src", "product_id": "samba-0:3.0.25b-1.el5_1.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba@3.0.25b-1.el5_1.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "samba-client-0:3.0.25b-1.el5_1.2.ia64", "product": { "name": "samba-client-0:3.0.25b-1.el5_1.2.ia64", "product_id": "samba-client-0:3.0.25b-1.el5_1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-client@3.0.25b-1.el5_1.2?arch=ia64" } } }, { "category": "product_version", "name": "samba-swat-0:3.0.25b-1.el5_1.2.ia64", "product": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.ia64", "product_id": "samba-swat-0:3.0.25b-1.el5_1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-swat@3.0.25b-1.el5_1.2?arch=ia64" } } }, { "category": "product_version", "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "product": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "product_id": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debuginfo@3.0.25b-1.el5_1.2?arch=ia64" } } }, { "category": "product_version", "name": "samba-common-0:3.0.25b-1.el5_1.2.ia64", "product": { "name": "samba-common-0:3.0.25b-1.el5_1.2.ia64", "product_id": "samba-common-0:3.0.25b-1.el5_1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-common@3.0.25b-1.el5_1.2?arch=ia64" } } }, { "category": "product_version", "name": "samba-0:3.0.25b-1.el5_1.2.ia64", "product": { "name": "samba-0:3.0.25b-1.el5_1.2.ia64", "product_id": "samba-0:3.0.25b-1.el5_1.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba@3.0.25b-1.el5_1.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "samba-client-0:3.0.25b-1.el5_1.2.ppc", "product": { "name": "samba-client-0:3.0.25b-1.el5_1.2.ppc", "product_id": "samba-client-0:3.0.25b-1.el5_1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-client@3.0.25b-1.el5_1.2?arch=ppc" } } }, { "category": "product_version", "name": "samba-swat-0:3.0.25b-1.el5_1.2.ppc", "product": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.ppc", "product_id": "samba-swat-0:3.0.25b-1.el5_1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-swat@3.0.25b-1.el5_1.2?arch=ppc" } } }, { "category": "product_version", "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "product": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "product_id": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debuginfo@3.0.25b-1.el5_1.2?arch=ppc" } } }, { "category": "product_version", "name": "samba-common-0:3.0.25b-1.el5_1.2.ppc", "product": { "name": "samba-common-0:3.0.25b-1.el5_1.2.ppc", "product_id": "samba-common-0:3.0.25b-1.el5_1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-common@3.0.25b-1.el5_1.2?arch=ppc" } } }, { "category": "product_version", "name": "samba-0:3.0.25b-1.el5_1.2.ppc", "product": { "name": "samba-0:3.0.25b-1.el5_1.2.ppc", "product_id": "samba-0:3.0.25b-1.el5_1.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba@3.0.25b-1.el5_1.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "product": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "product_id": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debuginfo@3.0.25b-1.el5_1.2?arch=ppc64" } } }, { "category": "product_version", "name": "samba-common-0:3.0.25b-1.el5_1.2.ppc64", "product": { "name": "samba-common-0:3.0.25b-1.el5_1.2.ppc64", "product_id": "samba-common-0:3.0.25b-1.el5_1.2.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-common@3.0.25b-1.el5_1.2?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "samba-client-0:3.0.25b-1.el5_1.2.s390x", "product": { "name": "samba-client-0:3.0.25b-1.el5_1.2.s390x", "product_id": "samba-client-0:3.0.25b-1.el5_1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-client@3.0.25b-1.el5_1.2?arch=s390x" } } }, { "category": "product_version", "name": "samba-swat-0:3.0.25b-1.el5_1.2.s390x", "product": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.s390x", "product_id": "samba-swat-0:3.0.25b-1.el5_1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-swat@3.0.25b-1.el5_1.2?arch=s390x" } } }, { "category": "product_version", "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "product": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "product_id": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debuginfo@3.0.25b-1.el5_1.2?arch=s390x" } } }, { "category": "product_version", "name": "samba-common-0:3.0.25b-1.el5_1.2.s390x", "product": { "name": "samba-common-0:3.0.25b-1.el5_1.2.s390x", "product_id": "samba-common-0:3.0.25b-1.el5_1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-common@3.0.25b-1.el5_1.2?arch=s390x" } } }, { "category": "product_version", "name": "samba-0:3.0.25b-1.el5_1.2.s390x", "product": { "name": "samba-0:3.0.25b-1.el5_1.2.s390x", "product_id": "samba-0:3.0.25b-1.el5_1.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba@3.0.25b-1.el5_1.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "product": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "product_id": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-debuginfo@3.0.25b-1.el5_1.2?arch=s390" } } }, { "category": "product_version", "name": "samba-common-0:3.0.25b-1.el5_1.2.s390", "product": { "name": "samba-common-0:3.0.25b-1.el5_1.2.s390", "product_id": "samba-common-0:3.0.25b-1.el5_1.2.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/samba-common@3.0.25b-1.el5_1.2?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-0:3.0.25b-1.el5_1.2.i386" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-0:3.0.25b-1.el5_1.2.ia64" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-0:3.0.25b-1.el5_1.2.ppc" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-0:3.0.25b-1.el5_1.2.s390x" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-0:3.0.25b-1.el5_1.2.src" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-0:3.0.25b-1.el5_1.2.x86_64" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-client-0:3.0.25b-1.el5_1.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-client-0:3.0.25b-1.el5_1.2.i386" }, "product_reference": "samba-client-0:3.0.25b-1.el5_1.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-client-0:3.0.25b-1.el5_1.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-client-0:3.0.25b-1.el5_1.2.ia64" }, "product_reference": "samba-client-0:3.0.25b-1.el5_1.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-client-0:3.0.25b-1.el5_1.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-client-0:3.0.25b-1.el5_1.2.ppc" }, "product_reference": "samba-client-0:3.0.25b-1.el5_1.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-client-0:3.0.25b-1.el5_1.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-client-0:3.0.25b-1.el5_1.2.s390x" }, "product_reference": "samba-client-0:3.0.25b-1.el5_1.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-client-0:3.0.25b-1.el5_1.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-client-0:3.0.25b-1.el5_1.2.x86_64" }, "product_reference": "samba-client-0:3.0.25b-1.el5_1.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-common-0:3.0.25b-1.el5_1.2.i386" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-common-0:3.0.25b-1.el5_1.2.ia64" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc64" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390x" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-common-0:3.0.25b-1.el5_1.2.x86_64" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-swat-0:3.0.25b-1.el5_1.2.i386" }, "product_reference": "samba-swat-0:3.0.25b-1.el5_1.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ia64" }, "product_reference": "samba-swat-0:3.0.25b-1.el5_1.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ppc" }, "product_reference": "samba-swat-0:3.0.25b-1.el5_1.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-swat-0:3.0.25b-1.el5_1.2.s390x" }, "product_reference": "samba-swat-0:3.0.25b-1.el5_1.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:samba-swat-0:3.0.25b-1.el5_1.2.x86_64" }, "product_reference": "samba-swat-0:3.0.25b-1.el5_1.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-0:3.0.25b-1.el5_1.2.i386" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-0:3.0.25b-1.el5_1.2.ia64" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-0:3.0.25b-1.el5_1.2.ppc" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-0:3.0.25b-1.el5_1.2.s390x" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-0:3.0.25b-1.el5_1.2.src" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-0:3.0.25b-1.el5_1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-0:3.0.25b-1.el5_1.2.x86_64" }, "product_reference": "samba-0:3.0.25b-1.el5_1.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-client-0:3.0.25b-1.el5_1.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-client-0:3.0.25b-1.el5_1.2.i386" }, "product_reference": "samba-client-0:3.0.25b-1.el5_1.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-client-0:3.0.25b-1.el5_1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-client-0:3.0.25b-1.el5_1.2.ia64" }, "product_reference": "samba-client-0:3.0.25b-1.el5_1.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-client-0:3.0.25b-1.el5_1.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-client-0:3.0.25b-1.el5_1.2.ppc" }, "product_reference": "samba-client-0:3.0.25b-1.el5_1.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-client-0:3.0.25b-1.el5_1.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-client-0:3.0.25b-1.el5_1.2.s390x" }, "product_reference": "samba-client-0:3.0.25b-1.el5_1.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-client-0:3.0.25b-1.el5_1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-client-0:3.0.25b-1.el5_1.2.x86_64" }, "product_reference": "samba-client-0:3.0.25b-1.el5_1.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-common-0:3.0.25b-1.el5_1.2.i386" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-common-0:3.0.25b-1.el5_1.2.ia64" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc64" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390x" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-common-0:3.0.25b-1.el5_1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-common-0:3.0.25b-1.el5_1.2.x86_64" }, "product_reference": "samba-common-0:3.0.25b-1.el5_1.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64" }, "product_reference": "samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-swat-0:3.0.25b-1.el5_1.2.i386" }, "product_reference": "samba-swat-0:3.0.25b-1.el5_1.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ia64" }, "product_reference": "samba-swat-0:3.0.25b-1.el5_1.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ppc" }, "product_reference": "samba-swat-0:3.0.25b-1.el5_1.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-swat-0:3.0.25b-1.el5_1.2.s390x" }, "product_reference": "samba-swat-0:3.0.25b-1.el5_1.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "samba-swat-0:3.0.25b-1.el5_1.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:samba-swat-0:3.0.25b-1.el5_1.2.x86_64" }, "product_reference": "samba-swat-0:3.0.25b-1.el5_1.2.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Rick King" ] } ], "cve": "CVE-2007-4138", "discovery_date": "2007-09-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "286271" } ], "notes": [ { "category": "description", "text": "The Winbind nss_info extension (nsswitch/idmap_ad.c) in idmap_ad.so in Samba 3.0.25 through 3.0.25c, when the \"winbind nss info\" option is set to rfc2307 or sfu, grants all local users the privileges of gid 0 when the (1) RFC2307 or (2) Services for UNIX (SFU) primary group attribute is not defined.", "title": "Vulnerability description" }, { "category": "summary", "text": "samba incorrect primary group assignment for domain users using the rfc2307 or sfu winbind nss info plugin", "title": "Vulnerability summary" }, { "category": "other", "text": "Not vulnerable. These issues did not affect the versions of Samba as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.", "title": "Statement" } ], "product_status": { "fixed": [ "5Client:samba-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-0:3.0.25b-1.el5_1.2.src", "5Client:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-0:3.0.25b-1.el5_1.2.src", "5Server:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4138" }, { "category": "external", "summary": "RHBZ#286271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=286271" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4138", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4138" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4138", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4138" } ], "release_date": "2007-09-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-11-15T16:29:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied. Use Red Hat Network to download\nand update your packages. To do so, run the following command (as root):\n\npup\n\nAlternatively, for a command-line interface, run the following command:\n\nyum update\n\nTo register your system to RHN, use the following command:\n\nrhn_register\n\nFor information on how to manually install or remove packages, refer to the\nfollowing link:\n\nhttp://kbase.redhat.com/faq/FAQ_80_11223.shtm", "product_ids": [ "5Client:samba-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-0:3.0.25b-1.el5_1.2.src", "5Client:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-0:3.0.25b-1.el5_1.2.src", "5Server:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1017" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "samba incorrect primary group assignment for domain users using the rfc2307 or sfu winbind nss info plugin" }, { "acknowledgments": [ { "names": [ "Samba developers" ] } ], "cve": "CVE-2007-4572", "discovery_date": "2007-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "294631" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "samba buffer overflow", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:samba-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-0:3.0.25b-1.el5_1.2.src", "5Client:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-0:3.0.25b-1.el5_1.2.src", "5Server:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-4572" }, { "category": "external", "summary": "RHBZ#294631", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=294631" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-4572", "url": "https://www.cve.org/CVERecord?id=CVE-2007-4572" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-4572", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-4572" } ], "release_date": "2007-11-15T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-11-15T16:29:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied. Use Red Hat Network to download\nand update your packages. To do so, run the following command (as root):\n\npup\n\nAlternatively, for a command-line interface, run the following command:\n\nyum update\n\nTo register your system to RHN, use the following command:\n\nrhn_register\n\nFor information on how to manually install or remove packages, refer to the\nfollowing link:\n\nhttp://kbase.redhat.com/faq/FAQ_80_11223.shtm", "product_ids": [ "5Client:samba-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-0:3.0.25b-1.el5_1.2.src", "5Client:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-0:3.0.25b-1.el5_1.2.src", "5Server:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1017" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "samba buffer overflow" }, { "acknowledgments": [ { "names": [ "Alin Rad Pop" ], "organization": "Secunia Research" } ], "cve": "CVE-2007-5398", "discovery_date": "2007-10-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "358831" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.", "title": "Vulnerability description" }, { "category": "summary", "text": "Samba \"reply_netbios_packet()\" Buffer Overflow Vulnerability", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "5Client:samba-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-0:3.0.25b-1.el5_1.2.src", "5Client:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-0:3.0.25b-1.el5_1.2.src", "5Server:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2007-5398" }, { "category": "external", "summary": "RHBZ#358831", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=358831" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2007-5398", "url": "https://www.cve.org/CVERecord?id=CVE-2007-5398" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-5398", "url": "https://nvd.nist.gov/vuln/detail/CVE-2007-5398" } ], "release_date": "2007-11-15T14:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2007-11-15T16:29:00+00:00", "details": "Before applying this update, make sure that all previously-released errata\nrelevant to your system have been applied. Use Red Hat Network to download\nand update your packages. To do so, run the following command (as root):\n\npup\n\nAlternatively, for a command-line interface, run the following command:\n\nyum update\n\nTo register your system to RHN, use the following command:\n\nrhn_register\n\nFor information on how to manually install or remove packages, refer to the\nfollowing link:\n\nhttp://kbase.redhat.com/faq/FAQ_80_11223.shtm", "product_ids": [ "5Client:samba-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-0:3.0.25b-1.el5_1.2.src", "5Client:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Client:samba-swat-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-0:3.0.25b-1.el5_1.2.src", "5Server:samba-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-client-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-client-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-client-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-common-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-common-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-common-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.ppc64", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-debuginfo-0:3.0.25b-1.el5_1.2.x86_64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.i386", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ia64", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.ppc", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.s390x", "5Server:samba-swat-0:3.0.25b-1.el5_1.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2007:1017" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Samba \"reply_netbios_packet()\" Buffer Overflow Vulnerability" } ] }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.