FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

samba -- integer overflow vulnerability

Affected packages
samba < 3.0.10
*,1 < samba < 3.0.10,1
ja-samba < 2.2.12.j1.0beta1_2
3.* < ja-samba < 3.0.10
3.*,1 < ja-samba < 3.0.10,1

Details

VuXML ID 3b3676be-52e1-11d9-a9e7-0001020eed82
Discovery 2004-12-02
Entry 2004-12-21
Modified 2008-09-26

Greg MacManus, iDEFENSE Labs reports:

Remote exploitation of an integer overflow vulnerability in the smbd daemon included in Samba 2.0.x, Samba 2.2.x, and Samba 3.0.x prior to and including 3.0.9 could allow an attacker to cause controllable heap corruption, leading to execution of arbitrary commands with root privileges.

Successful remote exploitation allows an attacker to gain root privileges on a vulnerable system. In order to exploit this vulnerability an attacker must possess credentials that allow access to a share on the Samba server. Unsuccessful exploitation attempts will cause the process serving the request to crash with signal 11, and may leave evidence of an attack in logs.

References

CVE Name CVE-2004-1154
URL http://www.idefense.com/application/poi/display?id=165&type=vulnerabilities
URL http://www.samba.org/samba/security/CAN-2004-1154.html