Impact
remote code execution
Solution
Please Install the Updated Packages.
Insight
The file server Samba has been updated to fix the following security problem:
Secunia research discovered vulnerability in Samba, which can be exploited by malicious people to compromise a vulnerable system.
The vulnerability is due to a boundary error within the "
receive_smb_raw()"
function in lib/util_sock.c when parsing SMB
packets. This can be exploited to cause a heap-based buffer overflow via an overly large SMB packet received in a client context.
Affected
samba on SUSE LINUX 10.1, openSUSE 10.2, openSUSE 10.3, SuSE Linux Enterprise Server 8, SUSE SLES 9, Novell Linux Desktop 9, Open Enterprise Server, Novell Linux POS 9, SUSE Linux Enterprise Desktop 10 SP1, SUSE Linux Enterprise Server 10 SP1, SLE SDK 10 SP1, SUSE Linux Enterprise Desktop 10 SP2, SUSE Linux Enterprise Server 10 SP2, SLE SDK 10 SP2
References
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2008-1105 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities