Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2007:1017 - Security Advisory
Issued:
2007-11-15
Updated:
2007-11-15

RHSA-2007:1017 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: samba security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated samba packages that fix security issues are now available for Red
Hat Enterprise Linux 5.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

Description

Samba is a suite of programs used by machines to share files, printers, and
other information.

A buffer overflow flaw was found in the way Samba creates NetBIOS replies.
If a Samba server is configured to run as a WINS server, a remote
unauthenticated user could cause the Samba server to crash or execute
arbitrary code. (CVE-2007-5398)

A heap based buffer overflow flaw was found in the way Samba authenticates
users. A remote unauthenticated user could trigger this flaw to cause the
Samba server to crash. Careful analysis of this flaw has determined that
arbitrary code execution is not possible, and under most circumstances will
not result in a crash of the Samba server. (CVE-2007-4572)

A flaw was found in the way Samba assigned group IDs under certain
conditions. If the "winbind nss info" parameter in smb.conf is set to
either "sfu" or "rfc2307", Samba users are incorrectly assigned the group
ID of 0. (CVE-2007-4138)

Red Hat would like to thank Alin Rad Pop of Secunia Research, Rick King,
and the Samba developers for responsibly disclosing these issues.

All Samba users are advised to upgrade to these updated packages, which
contain a backported patch to correct these issues.

Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied. Use Red Hat Network to download
and update your packages. To do so, run the following command (as root):

pup

Alternatively, for a command-line interface, run the following command:

yum update

To register your system to RHN, use the following command:

rhn_register

For information on how to manually install or remove packages, refer to the
following link:

http://kbase.redhat.com/faq/FAQ_80_11223.shtm

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 286271 - CVE-2007-4138 samba incorrect primary group assignment for domain users using the rfc2307 or sfu winbind nss info plugin
  • BZ - 294631 - CVE-2007-4572 samba buffer overflow
  • BZ - 358831 - CVE-2007-5398 Samba "reply_netbios_packet()" Buffer Overflow Vulnerability

CVEs

  • CVE-2007-5398
  • CVE-2007-4572
  • CVE-2007-4138

References

  • http://www.redhat.com/security/updates/classification/#critical
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
samba-3.0.25b-1.el5_1.2.src.rpm SHA-256: 7ddfd95febf7fcc955c617522de307719aa991af2c7d9b5eb882b8ada0cbc425
x86_64
samba-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: 49224f931b019f402608314f1972f98f19886e91215a2390438074cfba430490
samba-client-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: a4f3f6da18f028f2eeeab432abcab1b3cee3f6c0ee0bfa1c6ca2149784e9fac1
samba-common-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 323023ce9fc8015edb5ddd932d8a2863d2b998b6f72a976ea4b4c82728f5f5e4
samba-common-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: ce6f623b4f8854290f9032bb4abc31b970eea9599f3b13ed5ef8c4232d36f55d
samba-swat-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: 149df44790547be1dd8c3413cdc72a206a01a34ede407b0dc5a3c732b5837d59
ia64
samba-3.0.25b-1.el5_1.2.ia64.rpm SHA-256: b67b15a08eed181f5ae4cc8022e7556070da8cd5cca9aea38718f0477705b9c9
samba-client-3.0.25b-1.el5_1.2.ia64.rpm SHA-256: d446301594cd8f2cad8959c3fbe565a80b830679c6a4f8ac4f1fc61348216615
samba-common-3.0.25b-1.el5_1.2.ia64.rpm SHA-256: 48288b49101cf8a7108c8e9902349e2369a5586e95f8dd82b3e0e51edb62b447
samba-swat-3.0.25b-1.el5_1.2.ia64.rpm SHA-256: aafb71e3d536a2b739766ba5919b91d865555917b8b0f473e96cdcc8199815c7
i386
samba-3.0.25b-1.el5_1.2.i386.rpm SHA-256: bdef820be266e3aa6cfbf821bbc695868d506f6c18c5cdebea9b35c28eafe21b
samba-client-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 1549f18dfcfb208bbc0d5641810666058d487d058cb575ec50a6cce85d45435d
samba-common-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 323023ce9fc8015edb5ddd932d8a2863d2b998b6f72a976ea4b4c82728f5f5e4
samba-swat-3.0.25b-1.el5_1.2.i386.rpm SHA-256: e941904bda1d7195c4e34eb2ed27f02beed540907de2e201cf1dc1cd67701ff4

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
samba-3.0.25b-1.el5_1.2.src.rpm SHA-256: 7ddfd95febf7fcc955c617522de307719aa991af2c7d9b5eb882b8ada0cbc425
x86_64
samba-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: 49224f931b019f402608314f1972f98f19886e91215a2390438074cfba430490
samba-client-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: a4f3f6da18f028f2eeeab432abcab1b3cee3f6c0ee0bfa1c6ca2149784e9fac1
samba-common-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 323023ce9fc8015edb5ddd932d8a2863d2b998b6f72a976ea4b4c82728f5f5e4
samba-common-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: ce6f623b4f8854290f9032bb4abc31b970eea9599f3b13ed5ef8c4232d36f55d
samba-swat-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: 149df44790547be1dd8c3413cdc72a206a01a34ede407b0dc5a3c732b5837d59
i386
samba-3.0.25b-1.el5_1.2.i386.rpm SHA-256: bdef820be266e3aa6cfbf821bbc695868d506f6c18c5cdebea9b35c28eafe21b
samba-client-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 1549f18dfcfb208bbc0d5641810666058d487d058cb575ec50a6cce85d45435d
samba-common-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 323023ce9fc8015edb5ddd932d8a2863d2b998b6f72a976ea4b4c82728f5f5e4
samba-swat-3.0.25b-1.el5_1.2.i386.rpm SHA-256: e941904bda1d7195c4e34eb2ed27f02beed540907de2e201cf1dc1cd67701ff4

Red Hat Enterprise Linux Desktop 5

SRPM
samba-3.0.25b-1.el5_1.2.src.rpm SHA-256: 7ddfd95febf7fcc955c617522de307719aa991af2c7d9b5eb882b8ada0cbc425
x86_64
samba-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: 49224f931b019f402608314f1972f98f19886e91215a2390438074cfba430490
samba-client-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: a4f3f6da18f028f2eeeab432abcab1b3cee3f6c0ee0bfa1c6ca2149784e9fac1
samba-common-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 323023ce9fc8015edb5ddd932d8a2863d2b998b6f72a976ea4b4c82728f5f5e4
samba-common-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: ce6f623b4f8854290f9032bb4abc31b970eea9599f3b13ed5ef8c4232d36f55d
samba-swat-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: 149df44790547be1dd8c3413cdc72a206a01a34ede407b0dc5a3c732b5837d59
i386
samba-3.0.25b-1.el5_1.2.i386.rpm SHA-256: bdef820be266e3aa6cfbf821bbc695868d506f6c18c5cdebea9b35c28eafe21b
samba-client-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 1549f18dfcfb208bbc0d5641810666058d487d058cb575ec50a6cce85d45435d
samba-common-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 323023ce9fc8015edb5ddd932d8a2863d2b998b6f72a976ea4b4c82728f5f5e4
samba-swat-3.0.25b-1.el5_1.2.i386.rpm SHA-256: e941904bda1d7195c4e34eb2ed27f02beed540907de2e201cf1dc1cd67701ff4

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
samba-3.0.25b-1.el5_1.2.src.rpm SHA-256: 7ddfd95febf7fcc955c617522de307719aa991af2c7d9b5eb882b8ada0cbc425
s390x
samba-3.0.25b-1.el5_1.2.s390x.rpm SHA-256: 3350bb61fcef64b6c69a2eaccceb95140d6a5de89c2771717605c283077db3a6
samba-client-3.0.25b-1.el5_1.2.s390x.rpm SHA-256: bbb662f541c4598f79c2f162792a2181f20f53049a8517f503706b67836a3b6b
samba-common-3.0.25b-1.el5_1.2.s390.rpm SHA-256: e7c68a3d4e941ed4e0aa0bb91a38f26f81b46717e748e1064653cc54e19cee3b
samba-common-3.0.25b-1.el5_1.2.s390x.rpm SHA-256: dcecee7780c6db4eb106b6d02b04ced45f1e32137c7bcc106d7050d0483ecd5b
samba-swat-3.0.25b-1.el5_1.2.s390x.rpm SHA-256: e4f658f37eb8b83eb1b013e25f4e6a647c18b19fb00778fa251d486a782fa027

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1

SRPM
s390x

Red Hat Enterprise Linux for Power, big endian 5

SRPM
samba-3.0.25b-1.el5_1.2.src.rpm SHA-256: 7ddfd95febf7fcc955c617522de307719aa991af2c7d9b5eb882b8ada0cbc425
ppc
samba-3.0.25b-1.el5_1.2.ppc.rpm SHA-256: 919b50607395843ec6f12c216ec390cfc9f8ec339381ca974a45913e4a376b4a
samba-client-3.0.25b-1.el5_1.2.ppc.rpm SHA-256: 0094440064a735be9af1bab06000a61a5d3bef5be4f40134bc88b7ecfd3f60c5
samba-common-3.0.25b-1.el5_1.2.ppc.rpm SHA-256: a3fc7e3d21ebbf99d81299163c9cd9ed784085a4476f97d6730dd837bc1dbbe5
samba-common-3.0.25b-1.el5_1.2.ppc64.rpm SHA-256: 01a4868863019c3da7ad49f1e645c974d76bed2e019810ff2ebbb1306486ed7d
samba-swat-3.0.25b-1.el5_1.2.ppc.rpm SHA-256: d4074e0474960fd8cb8ccda003101878513cfccfc8e7c2361609dfbe4ca003f0

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
samba-3.0.25b-1.el5_1.2.src.rpm SHA-256: 7ddfd95febf7fcc955c617522de307719aa991af2c7d9b5eb882b8ada0cbc425
x86_64
samba-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: 49224f931b019f402608314f1972f98f19886e91215a2390438074cfba430490
samba-client-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: a4f3f6da18f028f2eeeab432abcab1b3cee3f6c0ee0bfa1c6ca2149784e9fac1
samba-common-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 323023ce9fc8015edb5ddd932d8a2863d2b998b6f72a976ea4b4c82728f5f5e4
samba-common-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: ce6f623b4f8854290f9032bb4abc31b970eea9599f3b13ed5ef8c4232d36f55d
samba-swat-3.0.25b-1.el5_1.2.x86_64.rpm SHA-256: 149df44790547be1dd8c3413cdc72a206a01a34ede407b0dc5a3c732b5837d59
i386
samba-3.0.25b-1.el5_1.2.i386.rpm SHA-256: bdef820be266e3aa6cfbf821bbc695868d506f6c18c5cdebea9b35c28eafe21b
samba-client-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 1549f18dfcfb208bbc0d5641810666058d487d058cb575ec50a6cce85d45435d
samba-common-3.0.25b-1.el5_1.2.i386.rpm SHA-256: 323023ce9fc8015edb5ddd932d8a2863d2b998b6f72a976ea4b4c82728f5f5e4
samba-swat-3.0.25b-1.el5_1.2.i386.rpm SHA-256: e941904bda1d7195c4e34eb2ed27f02beed540907de2e201cf1dc1cd67701ff4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility