search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Samba contains a remotely exploitable stack buffer overflow

Vulnerability Note VU#958321

Original Release Date: 2002-12-13 | Last Revised: 2003-05-16

Overview

A remotely exploitable stack buffer overflow exists in the Samba server daemon (smbd).

Description

Versions 2.2.2 through 2.2.6 of Samba contain a remotely exploitable stack buffer overflow. The Samba Team describes Samba as follows:

The Samba software suite is a collection of programs that implements the Server Message Block (commonly abbreviated as SMB) protocol for UNIX systems. This protocol is sometimes also referred to as the Common Internet File System (CIFS), LanManager or NetBIOS protocol.
The Samba Team describes the vulnerability as follows:
There was a bug in the length checking for encrypted password change requests from clients. A client could potentially send an encrypted password, which, when decrypted with the old hashed password could be used as a buffer overrun attack on the stack of smbd. The attach would have to be crafted such that converting a DOS codepage string to little endian UCS2 unicode would translate into an executable block of code.

Impact

A remote attacker can execute arbitrary code with superuser privileges or can cause smbd to crash.

Solution

Apply a patch from your vendor.

Vendor Information

958321
 

View all 14 vendors View less vendors


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was discovered by Steve Langasek and Eloy Paris.

This document was written by Ian A Finlay.

Other Information

CVE IDs: CVE-2002-1318
Severity Metric: 45.56
Date Public: 2002-11-20
Date First Published: 2002-12-13
Date Last Updated: 2003-05-16 18:19 UTC
Document Revision: 23

Sponsored by CISA.