ESX Server 3.0.1, Patch ESX-1002968: Security Update to the Samba Package (1002968)
This patch provides updates to the Samba package distributed with the service console for ESX Server 3.0.1. The patch addresses the following security issues:
- An issue where attackers on the service console management network can cause a stack-based buffer overflow in the reply_netbios_packet() function of nmbd in Samba. On systems where Samba is being used as a WINS server, exploiting this vulnerability can allow remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
- An issue where attackers on the service console management network can exploit a vulnerability that occurs when Samba is configured as a primary or backup domain controller. The vulnerability allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
Note: These issues only affect the service console network, and are not remote vulnerabilities for ESX Server hosts that have been set up with the security best practices provided by VMware. See http://www.vmware.com/resources/techresources/726 for more information on security best practices.
There are no symptoms for this security issue.
To avoid installing the samba-3.0.9-1.3E.14.1vmw RPM on the host, use the esxupdate utility with the -x option or --exclude <package_name> .
Download and verify the patch bundle as follows:
1. Download patch ESX-1002968 from http://www.vmware.com/download/vi/vi3_patches.html .
2. Log in to the ESX Server service console as root.
3. Create a local depot directory.
# mkdir -p /var/updates
Note: VMware recommends that you use the updates directory.
4. Change your working directory to /var/updates.
# cd /var/updates
5. Download the tar file into the /var/updates directory.
The md5 checksum output should match the following:
7. Extract the compressed tar archive:
# tar -xvzf ESX-1002968.tgz
8. Change to the newly created directory, /var/updates/ESX-1002968:
# cd ESX-1002968
Note: All virtual machines on the host must be either shut down or migrated using VMotion before applying the patch. A reboot of the ESX Server host is required after applying this patch.
After you download and extract the archive, and if you are in the directory that you previously created, use the following command to install the update:
# esxupdate update
To run esxupdate from a different directory, you must specify the bundle path in the command:
# esxupdate -r file://<directory>/ESX-1002968 update
For example, if the host is called depot:
# esxupdate -r file:///depot/var/updates/ESX-1002968 update
During the update process, logs appear on the terminal. You can specify the verbosity of esxupdate logs by using the -v option as shown below.
# esxupdate -v 10 file://<directory>/ESX-1002968 update
For more information how to use esxupdate, see the Patch Management for ESX Server 3 tech note at http://www.vmware.com/pdf/esx3_esxupdate.pdf .