Debian Security Advisory

DSA-463-1 samba -- privilege escalation

Date Reported:
12 Mar 2004
Affected Packages:
Security database references:
In the Bugtraq database (at SecurityFocus): BugTraq ID 9619.
In Mitre's CVE dictionary: CVE-2004-0186.
More information:

Samba, a LanManager-like file and printer server for Unix, was found to contain a vulnerability whereby a local user could use the "smbmnt" utility, which is setuid root, to mount a file share from a remote server which contained setuid programs under the control of the user. These programs could then be executed to gain privileges on the local system.

For the current stable distribution (woody) this problem has been fixed in version 2.2.3a-13.

For the unstable distribution (sid) this problem has been fixed in version 3.0.2-2.

We recommend that you update your samba package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Architecture-independent component:
Intel IA-32:
Intel IA-64:
Motorola 680x0:
Big endian MIPS:
Little endian MIPS:
IBM S/390:
Sun Sparc:

MD5 checksums of the listed files are available in the original advisory.