search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Samba NDR MS-RPC heap buffer overflow

Vulnerability Note VU#773720

Original Release Date: 2007-05-14 | Last Revised: 2007-08-08

Overview

Samba fails to properly handle malformed MS-RPC packets. Exploitation of this vulnerability could allow a remote attacker to execute arbitrary code.

Description

Samba is a widely used open-source implementation of Server Message Block (SMB)/Common Internet File System (CIFS). Network Data Representation (NDR) is the scheme to encode MS-RPC data for transport. Samba fails to properly validate MS-RPC packets. Specifically, Samba's NDR functions do not properly validate arguments supplied to memory allocation routines. This results in a buffer of insufficient size being allocated. When data is copied to this buffer, a heap-based buffer overflow may occur.

More information is available in Samba's Security Announcement.

Impact

A remote attacker may be able to execute arbitrary code.

Solution

Apply a patch or upgrade
These vulnerabilities are addressed in Samba version 3.0.25. In addition, patches are available to address this vulnerability in Samba version 3.0.24. Refer to the Samba Security Releases website for more information.

Administrators who get Samba from their operating system vendor should see the systems affected portion of this document for a list of affected vendors.

Vendor Information

773720
 

View all 42 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by the Samba Team. Samba, in turn credits Brian Schafer of TippingPoint.

This document was written by Jeff Gennari.

Other Information

CVE IDs: CVE-2007-2446
Severity Metric: 7.65
Date Public: 2007-05-14
Date First Published: 2007-05-14
Date Last Updated: 2007-08-08 17:39 UTC
Document Revision: 34

Sponsored by CISA.