Samba patch issued for buffer overflow vulnerability

A software buffer overflow vulnerability in Samba open-source software could give an attacker remote access to a machine running that software, according to security company Digital Defense Inc.

The Samba Team, a group that manages the open-source software, released patches Monday and a new version of the software, Samba 2.2.8a, to address the vulnerability. Samba is a widely used software package that enables users to access and use files, printers and other shared resources on a corporate intranet or on the Internet.

Samba works with a variety of operating systems, including Linux, Unix, OpenVMS and OS/2 and allows files hosted on machines running those operating systems to share files with machines running versions of the Microsoft Corp. Windows operating system.

The buffer overflow vulnerability disclosed Monday by Digital Defense is due to an improperly written function within the Samba code.

Buffer overflows occur when a process tries to store more data in a buffer, or temporary data storage area, than it was intended to hold. Malicious hackers can use buffer overflows to place and execute code on compromised machines.

The new vulnerability has been known about within hacking circles for more than a month and was already being used to attack vulnerable systems on the Internet before the Digital Defense advisory was released, according to a security expert with knowledge of the hacking community.

In its advisory, Digital Defense, in San Antonio, Texas, said that it detected an active exploit using the Samba vulnerability on a test system it set up on the Internet.

However, Digital Defense may be to blame for some of those exploits.

Along with its advisory, Digital Defense Monday accidentally posted its own exploit code, a script named "" on its Security Tools page. (See

When run against a vulnerable system, the exploit provided by Digital Defense would give an attacker total access to the remote system.

"It was an unfortunate incident. We had an individual who was overzealous and released a script we had developed for internal development and testing of the vulnerability," said Rick Fleming, chief technology officer at Digital Defense.

The script was available for download from Digital Defense for approximately 12 hours, but no figures were available on how many copies of the file were downloaded during that time, Fleming said.

While it is common for Digital Defense to release tools that detect and test for the vulnerabilities the company uncovers, the file was not an example of such a tool, according to Fleming.

"Tools are usually a proof of concept. They're not things that anyone can run. You need a programming background to effectively use the tool," he said.

In addition, Digital Defense usually waits at least a month after the release of a patch from the vendor to release a tool, depending on the severity of the vulnerability. In some cases, no tool is released, Fleming said.

Responding to the mishap, Digital Defense changed its policies that cover the release of advisories. Sign off from senior management in the form of a digital signature is now required before the release of any information, Fleming said.

Samba is a standard part of many Linux and Unix distributions including those released by Red Hat Inc., MandrakeSoft SA and Debian. All previous versions of Samba up to version 2.2.8 are affected by the vulnerability.

Despite the fact that the vulnerability is widespread, it is unlikely that it could be exploited from remote users on the Internet, according to Fleming.

"We found very few instances, if any, of somebody who has a Samba share on their extranet side. If they did (have such a share) it was on a server that already gives access to everybody anyway," Fleming said.

The risk for most Samba users is from internal attacks, he said.

Digital Defense urged Samba users to check their Samba servers for signs of compromise and to apply patches for the vulnerability or upgrade to Samba 2.2.8a. (See

By Monday, major Linux and Unix vendors were notifying users of the problem and releasing software updates that fixed the Samba vulnerability for their own products.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Paul Roberts

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Jack Jeffries


As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr


The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Product Launch Showcase

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?