VID |
23225 |
Severity |
40 |
Port |
139 |
Protocol |
TCP |
Class |
Samba |
Detailed Description |
According to its banner, the version of Samba 3.x running on the remote host is earlier than 3.5.5 / 3.4.9 / 3.3.14. The 'sid_parse()' and related 'dom_sid_parse()' functions in such versions fail to correctly check their input lengths when reading a binary representation of a Windows SID (Security ID).
An attacker who is able to get a connection to a file share, either authenticated or via a guest connection, can leverage this issue to launch a stack buffer overflow attack against the affected smbd service and possibly execute arbitrary code.
* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.
* References: https://bugzilla.samba.org/show_bug.cgi?id=7669 http://www.samba.org/samba/security/CVE-2010-3069.html http://www.samba.org/samba/history/samba-3.5.5.html http://www.samba.org/samba/history/samba-3.4.9.html http://www.samba.org/samba/history/samba-3.3.14.html
* Platforms Affected: Samba Project, Samba versions of 3.x before 3.5.5 / 3.4.9 / 3.3.14 Linux Any version Unix Any version |
Recommendation |
Upgrade to the latest version of Samba 3.5.5 / 3.4.9 / 3.3.14 or later, available from the Samba Web site at http://us1.samba.org/samba/ |
Related URL |
CVE-2010-3069 (CVE) |
Related URL |
43212 (SecurityFocus) |
Related URL |
(ISS) |
|