diff options
-rw-r--r-- | debian/changelog | 9 | ||||
-rw-r--r-- | debian/patches/security-CVE-2007-4572.patch | 302 | ||||
-rw-r--r-- | debian/patches/security-CVE-2007-5398.patch | 27 |
3 files changed, 338 insertions, 0 deletions
diff --git a/debian/changelog b/debian/changelog index fbc1a2a27d..c3e5a9267e 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,12 @@ +samba (3.0.14a-3sarge7) oldstable-security; urgency=low + + * Fix a remote code execution vulnerability when running nmbd as a + WINS server. (CVE-2007-5398) + * Fix a buffer overflow in nmbd when running as a domain controller + during the processing GETDC logon server requests. (CVE-2007-4572) + + -- Steve Langasek <vorlon@debian.org> Tue, 13 Nov 2007 16:15:31 -0800 + samba (3.0.14a-3sarge6) oldstable-security; urgency=high * Fix typo in patch for CVE-2007-2447 that would cause segfaults diff --git a/debian/patches/security-CVE-2007-4572.patch b/debian/patches/security-CVE-2007-4572.patch new file mode 100644 index 0000000000..3ea25d4e60 --- /dev/null +++ b/debian/patches/security-CVE-2007-4572.patch @@ -0,0 +1,302 @@ +Index: samba/source/lib/charcnv.c +=================================================================== +--- samba/source/lib/charcnv.c (revision 25137) ++++ samba/source/lib/charcnv.c (working copy) +@@ -841,16 +841,19 @@ + * </dl> + * + * @param dest_len the maximum length in bytes allowed in the +- * destination. If @p dest_len is -1 then no maximum is used. ++ * destination. + **/ + size_t push_ascii(void *dest, const char *src, size_t dest_len, int flags) + { + size_t src_len = strlen(src); + pstring tmpbuf; ++ size_t ret; + +- /* treat a pstring as "unlimited" length */ +- if (dest_len == (size_t)-1) +- dest_len = sizeof(pstring); ++ /* No longer allow a length of -1. */ ++ if (dest_len == (size_t)-1) { ++ smb_panic("push_ascii - dest_len == -1"); ++ return (size_t)0; ++ } + + if (flags & STR_UPPER) { + pstrcpy(tmpbuf, src); +@@ -861,7 +864,11 @@ + if (flags & (STR_TERMINATE | STR_TERMINATE_ASCII)) + src_len++; + +- return convert_string(CH_UNIX, CH_DOS, src, src_len, dest, dest_len, True); ++ ret = convert_string(CH_UNIX, CH_DOS, src, src_len, dest, dest_len, True); ++ if (ret == (size_t)-1) { ++ return 0; ++ } ++ return ret; + } + + size_t push_ascii_fstring(void *dest, const char *src) +Index: samba/source/libsmb/ntlmssp_parse.c +=================================================================== +--- samba/source/libsmb/ntlmssp_parse.c (revision 25137) ++++ samba/source/libsmb/ntlmssp_parse.c (working copy) +@@ -152,7 +152,8 @@ + break; + case 'C': + s = va_arg(ap, char *); +- head_ofs += push_string(NULL, blob->data+head_ofs, s, -1, ++ n = str_charnum(s) + 1; ++ head_ofs += push_string(NULL, blob->data+head_ofs, s, n, + STR_ASCII|STR_TERMINATE); + break; + } +Index: samba/source/nmbd/nmbd_processlogon.c +=================================================================== +--- samba/source/nmbd/nmbd_processlogon.c (revision 25137) ++++ samba/source/nmbd/nmbd_processlogon.c (working copy) +@@ -95,7 +95,7 @@ + DEBUG(4,("process_logon_packet: Logon from %s: code = 0x%x\n", inet_ntoa(p->ip), code)); + + switch (code) { +- case 0: ++ case 0: + { + fstring mach_str, user_str, getdc_str; + char *q = buf + 2; +@@ -135,7 +135,9 @@ + + fstrcpy(reply_name, "\\\\"); + fstrcat(reply_name, my_name); +- push_ascii_fstring(q, reply_name); ++ push_ascii(q,reply_name, ++ sizeof(outbuf)-PTR_DIFF(q, outbuf), ++ STR_TERMINATE); + q = skip_string(q, 1); /* PDC name */ + + SSVAL(q, 0, token); +@@ -143,7 +145,7 @@ + + dump_data(4, outbuf, PTR_DIFF(q, outbuf)); + +- send_mailslot(True, getdc_str, ++ send_mailslot(True, getdc_str, + outbuf,PTR_DIFF(q,outbuf), + global_myname(), 0x0, + mach_str, +@@ -159,7 +161,7 @@ + char *q = buf + 2; + char *machine = q; + +- if (!lp_domain_master()) { ++ if (!lp_domain_master()) { + /* We're not Primary Domain Controller -- ignore this */ + return; + } +@@ -231,7 +233,9 @@ + q += 2; + + fstrcpy(reply_name,my_name); +- push_ascii_fstring(q, reply_name); ++ push_ascii(q, reply_name, ++ sizeof(outbuf)-PTR_DIFF(q, outbuf), ++ STR_TERMINATE); + q = skip_string(q, 1); /* PDC name */ + + /* PDC and domain name */ +@@ -239,8 +243,15 @@ + /* Make a full reply */ + q = ALIGN2(q, outbuf); + +- q += dos_PutUniCode(q, my_name, sizeof(pstring), True); /* PDC name */ +- q += dos_PutUniCode(q, lp_workgroup(),sizeof(pstring), True); /* Domain name*/ ++ q += dos_PutUniCode(q, my_name, ++ sizeof(pstring) - PTR_DIFF(q, outbuf), ++ True); /* PDC name */ ++ q += dos_PutUniCode(q, lp_workgroup(), ++ sizeof(pstring) - (q-outbuf), ++ True); /* Domain name*/ ++ if (sizeof(pstring) - PTR_DIFF(q, outbuf) < 8) { ++ return; ++ } + SIVAL(q, 0, 1); /* our nt version */ + SSVAL(q, 4, 0xffff); /* our lmnttoken */ + SSVAL(q, 6, 0xffff); /* our lm20token */ +@@ -376,9 +387,15 @@ + + q += 2; + +- q += dos_PutUniCode(q, reply_name,sizeof(pstring), True); +- q += dos_PutUniCode(q, ascuser, sizeof(pstring), True); +- q += dos_PutUniCode(q, lp_workgroup(),sizeof(pstring), True); ++ q += dos_PutUniCode(q, reply_name, ++ sizeof(pstring) - PTR_DIFF(q, outbuf), ++ True); ++ q += dos_PutUniCode(q, ascuser, ++ sizeof(pstring) - PTR_DIFF(q, outbuf), ++ True); ++ q += dos_PutUniCode(q, lp_workgroup(), ++ sizeof(pstring) - PTR_DIFF(q, outbuf), ++ True); + } + #ifdef HAVE_ADS + else { +@@ -393,7 +410,10 @@ + + get_mydnsdomname(domain); + get_myname(hostname); +- ++ ++ if (sizeof(outbuf) - PTR_DIFF(q, outbuf) < 8) { ++ return; ++ } + if (SVAL(uniuser, 0) == 0) { + SIVAL(q, 0, SAMLOGON_AD_UNK_R); /* user unknown */ + } else { +@@ -406,6 +426,9 @@ + q += 4; + + /* Push Domain GUID */ ++ if (sizeof(outbuf) - PTR_DIFF(q, outbuf) < UUID_FLAT_SIZE) { ++ return; ++ } + if (False == secrets_fetch_domain_guid(domain, &domain_guid)) { + DEBUG(2, ("Could not fetch DomainGUID for %s\n", domain)); + return; +@@ -421,12 +444,20 @@ + q1 = q; + while ((component = strtok(dc, "."))) { + dc = NULL; +- size = push_ascii(&q[1], component, -1, 0); ++ if (sizeof(outbuf) - PTR_DIFF(q, outbuf) < 1) { ++ return; ++ } ++ size = push_ascii(&q[1], component, ++ sizeof(outbuf) - PTR_DIFF(q+1, outbuf), ++ 0); + SCVAL(q, 0, size); + q += (size + 1); + } + + /* Unk0 */ ++ if (sizeof(outbuf) - PTR_DIFF(q, outbuf) < 4) { ++ return; ++ } + SCVAL(q, 0, 0); + q++; + +@@ -436,44 +467,74 @@ + q += 2; + + /* Hostname */ +- size = push_ascii(&q[1], hostname, -1, 0); ++ size = push_ascii(&q[1], hostname, ++ sizeof(outbuf) - PTR_DIFF(q+1, outbuf), ++ 0); + SCVAL(q, 0, size); + q += (size + 1); ++ ++ if (sizeof(outbuf) - PTR_DIFF(q, outbuf) < 3) { ++ return; ++ } ++ + SCVAL(q, 0, 0xc0 | ((str_offset >> 8) & 0x3F)); + SCVAL(q, 1, str_offset & 0xFF); + q += 2; + + /* NETBIOS of domain */ +- size = push_ascii(&q[1], lp_workgroup(), -1, STR_UPPER); ++ size = push_ascii(&q[1], lp_workgroup(), ++ sizeof(outbuf) - PTR_DIFF(q+1, outbuf), ++ STR_UPPER); + SCVAL(q, 0, size); + q += (size + 1); + + /* Unk1 */ ++ if (sizeof(outbuf) - PTR_DIFF(q, outbuf) < 2) { ++ return; ++ } ++ + SCVAL(q, 0, 0); + q++; + + /* NETBIOS of hostname */ +- size = push_ascii(&q[1], my_name, -1, 0); ++ size = push_ascii(&q[1], my_name, ++ sizeof(outbuf) - PTR_DIFF(q+1, outbuf), ++ 0); + SCVAL(q, 0, size); + q += (size + 1); + + /* Unk2 */ ++ if (sizeof(outbuf) - PTR_DIFF(q, outbuf) < 4) { ++ return; ++ } ++ + SCVAL(q, 0, 0); + q++; + + /* User name */ + if (SVAL(uniuser, 0) != 0) { +- size = push_ascii(&q[1], ascuser, -1, 0); ++ size = push_ascii(&q[1], ascuser, ++ sizeof(outbuf) - PTR_DIFF(q+1, outbuf), ++ 0); + SCVAL(q, 0, size); + q += (size + 1); + } + + q_orig = q; + /* Site name */ +- size = push_ascii(&q[1], "Default-First-Site-Name", -1, 0); ++ if (sizeof(outbuf) - PTR_DIFF(q, outbuf) < 1) { ++ return; ++ } ++ size = push_ascii(&q[1], "Default-First-Site-Name", ++ sizeof(outbuf) - PTR_DIFF(q+1, outbuf), ++ 0); + SCVAL(q, 0, size); + q += (size + 1); + ++ if (sizeof(outbuf) - PTR_DIFF(q, outbuf) < 18) { ++ return; ++ } ++ + /* Site name (2) */ + str_offset = q - q_orig; + SCVAL(q, 0, 0xc0 | ((str_offset >> 8) & 0x3F)); +@@ -494,6 +555,10 @@ + } + #endif + ++ if (sizeof(outbuf) - PTR_DIFF(q, outbuf) < 8) { ++ return; ++ } ++ + /* tell the client what version we are */ + SIVAL(q, 0, ((ntversion < 11) || (SEC_ADS != lp_security())) ? 1 : 13); + /* our ntversion */ +--- samba/source/smbd/lanman.c.orig 2004-12-15 09:33:17.000000000 -0500 ++++ samba/source/smbd/lanman.c 2007-10-23 15:25:54.000000000 -0400 +@@ -347,7 +347,7 @@ + SIVAL(drivdata,0,sizeof drivdata); /* cb */ + SIVAL(drivdata,4,1000); /* lVersion */ + memset(drivdata+8,0,32); /* szDeviceName */ +- push_ascii(drivdata+8,"NULL",-1, STR_TERMINATE); ++ push_ascii(drivdata+8,"NULL",32, STR_TERMINATE); + PACKl(desc,"l",drivdata,sizeof drivdata); /* pDriverData */ + } + +--- samba-3.0.9/source/nmbd/nmbd_sendannounce.c.orig 2007-10-23 15:48:43.000000000 -0400 ++++ samba-3.0.9/source/nmbd/nmbd_sendannounce.c 2007-10-23 15:48:54.000000000 -0400 +@@ -116,7 +116,7 @@ + SSVAL(p,27,BROWSER_ELECTION_VERSION); + SSVAL(p,29,BROWSER_CONSTANT); /* Browse signature. */ + +- p += 31 + push_string(NULL, p+31, server_comment, -1, STR_ASCII|STR_TERMINATE); ++ p += 31 + push_string(NULL, p+31, server_comment, sizeof(outbuf) - (p + 31 - outbuf), STR_ASCII|STR_TERMINATE); + + send_mailslot(False,BROWSE_MAILSLOT, outbuf, PTR_DIFF(p,outbuf), + from_name, 0x0, to_name, to_type, to_ip, subrec->myip, diff --git a/debian/patches/security-CVE-2007-5398.patch b/debian/patches/security-CVE-2007-5398.patch new file mode 100644 index 0000000000..0e1285cdd6 --- /dev/null +++ b/debian/patches/security-CVE-2007-5398.patch @@ -0,0 +1,27 @@ +-----BEGIN PGP SIGNED MESSAGE----- +Hash: SHA1 + +diff --git a/source/nmbd/nmbd_packets.c b/source/nmbd/nmbd_packets.c +index d49c8ba..b78ab5b 100644 +- --- a/source/nmbd/nmbd_packets.c ++++ b/source/nmbd/nmbd_packets.c +@@ -970,6 +970,12 @@ for id %hu\n", packet_type, nmb_namestr(&orig_nmb->question.question_name), + nmb->answers->ttl = ttl; + + if (data && len) { ++ if (len < 0 || len > sizeof(nmb->answers->rdata)) { ++ DEBUG(5,("reply_netbios_packet: " ++ "invalid packet len (%d)\n", ++ len )); ++ return; ++ } + nmb->answers->rdlength = len; + memcpy(nmb->answers->rdata, data, len); + } +-----BEGIN PGP SIGNATURE----- +Version: GnuPG v1.4.6 (GNU/Linux) + +iD8DBQFHN7DWbzORW2Vot+oRAuVGAKCjVMern41qgbVPeaM5RNNjdZ349wCbB5NJ +3wPX5IzlWSX5RHZHgyKcPfY= +=EiYO +-----END PGP SIGNATURE----- |