search menu icon-carat-right cmu-wordmark

CERT Coordination Center

SMB filesystem read system call vulnerable to buffer overflow

Vulnerability Note VU#726198

Original Release Date: 2005-02-02 | Last Revised: 2006-04-19

Overview

The SMB filesystem read() system call contains buffer overflow vulnerability that may allow an attacker to cause a denial-of-service condition.

Description

"Server Message Block (SMB) is an application-level protocol that supports file, printer, and other resource sharing. The SMB filesystem is a network filesystem built on the SMB protocol. A lack of bounds checking in the read() system call may allow a buffer overflow to occur. When a request is made to a SMB server, the read() system call on the SMB client's system expects to receive a pre-specified amount of data. If more data is supplied to the read() call than expected, the buffer overflow will occur. Note that it may be possible for a remote attacker to set up a malicious smb server to exploit this vulnerability.

More detailed information is available in e-matters security advisory 14/2004.

Impact

A remote attacker may be able to cause a denial-of-service condition. In addition, an attacker may be able to execute arbitrary code on the vulnerable system. However, this possibility is unconfirmed.

Solution

Upgrade Your Linux Kernel


This vulnerability was corrected in verson 2.4.28 of the Kernel. Users are encouraged to upgrade to this version.

Contact Your Vendor

Users who suspect they are vulnerable are encouraged to check with their Linux vendor to determine the appropriate action to take.

Vendor Information

726198
 

View all 38 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by Stefan Esser.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2004-0883
Severity Metric: 1.06
Date Public: 2004-11-17
Date First Published: 2005-02-02
Date Last Updated: 2006-04-19 11:16 UTC
Document Revision: 99

Sponsored by CISA.