Re: lug-bg: SAMBA Remote Exploit
- Subject: Re: lug-bg: SAMBA Remote Exploit
- From: kleo@email.domain.hidden (Kliment Ognianov)
- Date: Mon, 14 Apr 2003 09:51:28 +0300
Marian Popov wrote:
<em class="quotelev1">> http://us1.samba.org/samba/samba.html
<em class="quotelev1">>
<em class="quotelev1">> Patchvaite se ili spiraite sambite :) zashtoto izleze remote exploit
<em class="quotelev1">> chrez koito se pridobiva root access na mashina runvashta samba.
<em class="quotelev1">> Exploita ne raboti SAMO na alpha versiie na samba 3.0 ili po-goliami.
<em class="quotelev1">>
<em class="quotelev1">> --
<em class="quotelev1">> Marian Popov
<em class="quotelev1">> Siterm Engeneering Ltd.
<em class="quotelev1">> mano_at_pazardjik.com.NOSPAM <mailto:mano_at_pazardjik.com.NOSPAM>
<em class="quotelev1">> --
Mano, Manoooo, nazad si s infoto, man! :)
Vij datata ...
|------------------------------------------------------------------------------|
Synopsis : Buffer Overflow in Samba allows remote root compromise
Package : Samba, Samba-TNG
Type : Remote Root Compromise
Issue date : ___04-07-2003___
Versions Affected : < Samba 2.2.8a, <= Samba 2.0.10, < Samba-TNG 0.3.2
Not Affected : Samba 3.0 Alpha Versions, CVS Versions of Samba-TNG
CVE Id : CAN-2003-0201
|------------------------------------------------------------------------------|
--
The Power to Serve! <http://www.freebsd.org>
.....................................
: Kliment Ognianov a.k.a. Pat Bush :
: Network Administrator & Developer :
: BulInfo Networks Department :
:...................................:
: http://www.bulinfo.net :
:...................................:
: +(359)-2-9699165,+(359)-88-670051 :
: ICQ #16864572, #64866894 :
:...................................:
============================================================================
A mail-list of Linux Users Group - Bulgaria (bulgarian linuxers).
http://www.linux-bulgaria.org - Hosted by Internet Group Ltd. - Stara Zagora
To unsubscribe: http://www.linux-bulgaria.org/public/mail_list.html
============================================================================
|