Knowledge Base

The VMware Knowledge Base provides support solutions, error messages and troubleshooting guides
 
Search the VMware Knowledge Base (KB)   View by Article ID
 

ESX Server 3.0.2, Patch ESX-1002975: Security Update to the Samba Package (1002975)

Details

Release Date: 01/02/08
Document Last Updated: 01/02/08
 
 
Download Now
Download Size:
21.0 MB
Download Filename:
ESX-1002975.tgz
md5sum:
797a7494c2c4eb49629d3f94818df5dd


Product Versions ESX Server 3.0.2
Patch Classification Security
Supersedes None
Virtual Machine Migration or Reboot Required Yes
ESX Server Host Reboot Required Yes
PRs Fixed 219517
Affected Hardware N/A
Affected Software Unknown
RPMs Included
samba-3.0.9-1.3E.14.1vmw, samba-client-3.0.9-1.3E.14.1vmw,
samba-common-3.0.9-1.3E.14.1vmw.i386.rpm
Related CVE numbers CVE-2007-4572, CVE-2007-5398

Summary

This patch provides updates to the Samba package distributed with the service console for ESX Server 3.0.2. The patch addresses the following security issues:

  • An issue where attackers on the service console management network can cause a stack-based buffer overflow in the reply_netbios_packet() function of nmbd in Samba. On systems where Samba is being used as a WINS server, exploiting this vulnerability can allow remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
  • An issue where attackers on the service console management network can exploit a vulnerability that occurs when Samba is configured as a primary or backup domain controller. The vulnerability allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2007-5398 and CVE-2007-4572 to these issues.

Note: These issues only affect the service console network, and are not remote vulnerabilities for ESX Server hosts that have been set up with the security best practices provided by VMware. See http://www.vmware.com/resources/techresources/726 for more information on security best practices.

Solution

Symptoms

There are no symptoms for this security issue.

Deployment Considerations

To avoid installing the samba-3.0.9-1.3E.14.1vmw RPM on the host, use the esxupdate utility with the -x option or --exclude <package_name>.

Download Instructions

Download and verify the patch bundle as follows:

1. Download patch ESX-1002975 from http://www.vmware.com/download/vi/vi3_patches.html .

2. Log in to the ESX Server service console as root.

3. Create a local depot directory.

# mkdir -p /var/updates

Note: VMware recommends that you use the updates directory.

4. Change your working directory to /var/updates .

# cd /var/updates

5. Download the tar file into the /var/updates directory.

6. Verify the integrity of the downloaded tar file:


# md5sum ESX-1002975.tgz

The md5 checksum output should match the following:

797a7494c2c4eb49629d3f94818df5dd ESX-1002975.tgz


7. Extract the compressed tar archive:

# tar -xvzf ESX-1002975.tgz

8. Change to the newly created directory, /var/updates/ESX-1002975 :

# cd ESX-1002975

Installation Instructions

Note: All virtual machines on the host must be either shut down or migrated using VMotion before applying the patch. A reboot of the ESX Server host is required after applying this patch.

After you download and extract the archive, and if you are in the directory that you previously created, use the following command to install the update:

# esxupdate update

To run esxupdate from a different directory, you must specify the bundle path in the command:

# esxupdate -r file://<directory>/ESX-1002975 update

For example, if the host is called depot:

# esxupdate -r file:///depot/var/updates/ESX-1002975 update

During the update process, logs appear on the terminal. You can specify the verbosity of esxupdate logs by using the -v option as shown below.

# esxupdate -v 10 file://<directory>/ESX-1002975 update

For more information how to use esxupdate, see the Patch Management for ESX Server 3 tech note at http://www.vmware.com/pdf/esx3_esxupdate.pdf .

Keywords

esxpatch;esx301;alertz;urlz

Request a Product Feature

To request a new product feature or to provide feedback on a VMware product, please visit the Request a Product Feature page.

Feedback

  • 0 Ratings

Did this article help you?
This article resolved my issue.
This article did not resolve my issue.
This article helped but additional information was required to resolve my issue.
What can we do to improve this information? (4000 or fewer characters)
  • 0 Ratings
Actions
KB: