Upstream information
Description
Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
National Vulnerability Database | |
---|---|
Base Score | 7.5 |
Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
SUSE Security Advisories:
- SUSE-SA:2008:026, published Wed, 04 Jun 2008 17:00:00 +0000
List of released packages
Product(s) | Fixed package version(s) | References |
---|---|---|
SUSE Linux Enterprise Desktop 11 SP4 SUSE Linux Enterprise Server for SAP Applications 11 SP4 SUSE Linux Enterprise Software Development Kit 11 SP4 |
| Patchnames: SUSE Linux Enterprise Software Development Kit 11 SP4 GA libldb-devel-3.6.3-0.58.1 |
SUSE Linux Enterprise Micro 6.0 |
| Patchnames: SUSE Linux Enterprise Micro 6.0 GA cifs-utils-7.0-2.9 SUSE Linux Enterprise Micro 6.0 GA samba-client-libs-4.19.4+git.339.acf1ccaa02-1.22 |
SUSE Linux Enterprise Server 11 SP1 |
| Patchnames: SUSE Linux Enterprise Server 11 SP1 GA cifs-mount-3.4.3-1.17.2 |
SUSE Linux Enterprise Server 11 SP2 |
| Patchnames: SUSE Linux Enterprise Server 11 SP2 GA cifs-utils-5.1-0.4.9 SUSE Linux Enterprise Server 11 SP2 GA ldapsmb-1.34b-12.18.3 |
SUSE Linux Enterprise Server 11 SP3 |
| Patchnames: SUSE Linux Enterprise Server 11 SP3 GA cifs-utils-5.1-0.11.1 SUSE Linux Enterprise Server 11 SP3 GA ldapsmb-1.34b-12.39.1 |
SUSE Linux Enterprise Server 11 SP4 |
| Patchnames: SUSE Linux Enterprise Server 11 SP4 GA cifs-utils-5.1-0.14.46 SUSE Linux Enterprise Server 11 SP4 GA ldapsmb-1.34b-12.58.1 SUSE Linux Enterprise Server 11 SP4 GA libtevent0-x86-3.6.3-0.39.1 SUSE Linux Enterprise Software Development Kit 11 SP4 GA libldb-devel-3.6.3-0.58.1 |
openSUSE Tumbleweed |
| Patchnames: openSUSE-Tumbleweed-2024-10683 openSUSE-Tumbleweed-2024-11365 |
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 03:06:45 2013CVE page last modified: Tue Sep 3 18:12:50 2024