View Full Version : [all variants] Samba "receive_smb_raw()" Buffer Overflow Vulnerability

May 29th, 2008, 06:41 PM

Highly critical
Impact: System access
Where: From remote
Solution Status: Vendor Patch

The vulnerability is caused due to a boundary error within the "receive_smb_raw()" function in lib/util_sock.c when parsing SMB packets. This can be exploited to cause a heap-based buffer overflow via an overly large SMB packet received in a client context.

Successful exploitation allows execution of arbitrary code by tricking a user into connecting to a malicious server (e.g. by clicking an "smb://" link) or by sending specially crafted packets to an "nmbd" server configured as a local or domain master browser.

The vulnerability is confirmed in versions 3.0.28a and 3.0.29. Prior versions may also be affected.



June 3rd, 2008, 02:20 PM
Bump. Is an updated package being worked on or should I compile the latest version from source?