Samba SID Parsing Buffer Overflow Vulnerability
RISK: Medium Risk
A vulnerability has been identified in Samba, which could be exploited by remote attackers to compromise a vulnerable system. This issue is caused by a buffer overflow error in the "sid_parse()" function and the related "dom_sid_parse()" function in the source4 code when reading a binary representation of a Windows SID (Security ID), which could allow a malicious client to crash an affected smbd server or execute arbitrary code.
Impact
- Remote Code Execution
System / Technologies affected
- Samba versions 3.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Apply patch for Samba version 3.3.13:
http://www.samba.org/samba/ftp/patches/security/samba-3.3.13-CVE-2010-3069.patch
- Apply patch for Samba version 3.4.8:
http://www.samba.org/samba/ftp/patches/security/samba-3.4.8-CVE-2010-3069.patch
- Apply patch for Samba version 3.5.4:
http://www.samba.org/samba/ftp/patches/security/samba-3.5.4-CVE-2010-3069.patch
Vulnerability Identifier
Source
Related Link
Share with