Bug 1152 - CVE-2011-0719 samba: Denial of service - memory corruption
Summary: CVE-2011-0719 samba: Denial of service - memory corruption
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: Cauldron
Hardware: All Linux
Priority: Normal critical
Target Milestone: ---
Assignee: Mageia Bug Squad
QA Contact:
URL: http://samba.org/samba/security/CVE-2...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2011-05-05 10:52 CEST by Jérôme Soyer
Modified: 2011-05-05 13:02 CEST (History)
0 users

See Also:
Source RPM: samba-3.5.5-2.mga1.src.rpm
CVE:
Status comment:


Attachments

Description Jérôme Soyer 2011-05-05 10:52:14 CEST
All current released versions of Samba are vulnerable to
a buffer overrun vulnerability. The sid_parse() function
(and related dom_sid_parse() function in the source4 code)
do not correctly check their input lengths when reading a
binary representation of a Windows SID (Security ID). This
allows a malicious client to send a sid that can overflow
the stack variable that is being used to store the SID in the
Samba smbd server.

A connection to a file share is needed to exploit this
vulnerability, either authenticated or unauthenticated
(guest connection).
Jérôme Soyer 2011-05-05 10:55:28 CEST

Summary: CVE-2010-3069 samba: Buffer Overrun Vulnerability => CVE-2011-0719 samba: Denial of service - memory corruption

Comment 1 Jérôme Soyer 2011-05-05 10:56:17 CEST
Error in my paste comment, the real is here :

Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.
Comment 2 Jérôme Soyer 2011-05-05 13:02:14 CEST
fixed in package samba-3.5.5-3.mga1

Status: NEW => RESOLVED
Resolution: (none) => FIXED


Note You need to log in before you can comment on or make changes to this bug.