CVE 2008-1105
Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.
Related bugs and status
CVE-2008-1105 (Candidate) is related to these bugs:
Bug #180493: [SRU] nmbd shuts down when network disconnected
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
180493 | [SRU] nmbd shuts down when network disconnected | samba (Ubuntu) | Medium | Fix Released | ||
180493 | [SRU] nmbd shuts down when network disconnected | samba | Medium | Fix Released | ||
180493 | [SRU] nmbd shuts down when network disconnected | samba (Debian) | Unknown | Fix Released | ||
180493 | [SRU] nmbd shuts down when network disconnected | samba (Ubuntu Hardy) | Undecided | Fix Released | ||
180493 | [SRU] nmbd shuts down when network disconnected | samba (Ubuntu Intrepid) | Medium | Fix Released |
Bug #235912: [CVE-2008-1105] Samba: boundary failure when parsing SMB responses
Summary | In | Importance | Status | |||
---|---|---|---|---|---|---|
235912 | [CVE-2008-1105] Samba: boundary failure when parsing SMB responses | samba (Ubuntu) | Undecided | Fix Released | ||
235912 | [CVE-2008-1105] Samba: boundary failure when parsing SMB responses | samba (Debian) | Unknown | Fix Released | ||
235912 | [CVE-2008-1105] Samba: boundary failure when parsing SMB responses | samba (Arch Linux) | Undecided | Fix Released | ||
235912 | [CVE-2008-1105] Samba: boundary failure when parsing SMB responses | samba (Ubuntu Dapper) | High | Fix Released | ||
235912 | [CVE-2008-1105] Samba: boundary failure when parsing SMB responses | samba (Ubuntu Feisty) | High | Fix Released | ||
235912 | [CVE-2008-1105] Samba: boundary failure when parsing SMB responses | samba (Ubuntu Hardy) | High | Fix Released | ||
235912 | [CVE-2008-1105] Samba: boundary failure when parsing SMB responses | samba (Ubuntu Gutsy) | High | Fix Released |
Bug #241448: Playing from Samba SMB shared folder now is not possible (it could be done until last upgrade).
See the
CVE page on Mitre.org
for more details.