[CVE-2008-1105] Samba: boundary failure when parsing SMB responses
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
samba (Arch Linux) |
Fix Released
|
Undecided
|
Unassigned | ||
samba (Debian) |
Fix Released
|
Unknown
|
|||
samba (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Dapper |
Fix Released
|
High
|
Jamie Strandboge | ||
Feisty |
Fix Released
|
High
|
Jamie Strandboge | ||
Gutsy |
Fix Released
|
High
|
Jamie Strandboge | ||
Hardy |
Fix Released
|
High
|
Jamie Strandboge |
Bug Description
Binary package hint: samba
CVE-2008-1105 description:
"Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response."
http://
http://
"Boundary failure when parsing SMB responses can result in a buffer overrun
Specifically crafted SMB responses can result in a heap overflow in the Samba client code.
Because the server process, smbd, can itself act as a client during operations such as
printer notification and domain authentication, this issue affects both Samba client and
server installations."
http://
Patch: http://
Changed in samba: | |
status: | Unknown → Fix Released |
Changed in samba: | |
assignee: | nobody → jdstrand |
importance: | Undecided → High |
status: | New → Triaged |
assignee: | nobody → jdstrand |
importance: | Undecided → High |
status: | New → Triaged |
assignee: | nobody → jdstrand |
importance: | Undecided → High |
status: | New → Triaged |
assignee: | nobody → jdstrand |
importance: | Undecided → High |
status: | New → Triaged |
Changed in samba: | |
status: | New → Fix Released |
Changed in samba: | |
status: | Triaged → In Progress |
status: | Triaged → In Progress |
status: | Triaged → In Progress |
status: | Triaged → In Progress |
Changed in samba: | |
status: | In Progress → Fix Committed |
status: | In Progress → Fix Committed |
status: | In Progress → Fix Committed |
status: | In Progress → Fix Committed |
DSA 1590-1: http:// www.debian. org/security/ 2008/dsa- 1590 (link not functioning yet)