| VID |
23225 |
| Severity |
40 |
| Port |
139 |
| Protocol |
TCP |
| Class |
Samba |
| Detailed Description |
According to its banner, the version of Samba 3.x running on the remote host is earlier than 3.5.5 / 3.4.9 / 3.3.14. The 'sid_parse()' and related 'dom_sid_parse()' functions in such versions fail to correctly check their input lengths when reading a binary representation of a Windows SID (Security ID).
An attacker who is able to get a connection to a file share, either authenticated or via a guest connection, can leverage this issue to launch a stack buffer overflow attack against the affected smbd service and possibly execute arbitrary code.
* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.
* References: https://bugzilla.samba.org/show_bug.cgi?id=7669 http://www.samba.org/samba/security/CVE-2010-3069.html http://www.samba.org/samba/history/samba-3.5.5.html http://www.samba.org/samba/history/samba-3.4.9.html http://www.samba.org/samba/history/samba-3.3.14.html
* Platforms Affected: Samba Project, Samba versions of 3.x before 3.5.5 / 3.4.9 / 3.3.14 Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of Samba 3.5.5 / 3.4.9 / 3.3.14 or later, available from the Samba Web site at http://us1.samba.org/samba/ |
| Related URL |
CVE-2010-3069 (CVE) |
| Related URL |
43212 (SecurityFocus) |
| Related URL |
(ISS) |
|