7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.97 High
EPSS
Percentile
99.7%
CentOS Errata and Security Advisory CESA-2008:0288-01
Samba is a suite of programs used by machines to share files, printers, and
other information.
A heap-based buffer overflow flaw was found in the way Samba clients handle
over-sized packets. If a client connected to a malicious Samba server, it
was possible to execute arbitrary code as the Samba client user. It was
also possible for a remote user to send a specially crafted print request
to a Samba server that could result in the server executing the vulnerable
client code, resulting in arbitrary code execution with the permissions of
the Samba server. (CVE-2008-1105)
Red Hat would like to thank Alin Rad Pop of Secunia Research for
responsibly disclosing this issue.
Users of Samba are advised to upgrade to these updated packages, which
contain a backported patch to resolve this issue.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2008-May/077103.html
Affected packages:
samba
samba-client
samba-common
samba-swat
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 2 | i386 | samba | <Β 2.2.12-1.21as.9.3 | samba-2.2.12-1.21as.9.3.i386.rpm |
CentOS | 2 | i386 | samba-client | <Β 2.2.12-1.21as.9.3 | samba-client-2.2.12-1.21as.9.3.i386.rpm |
CentOS | 2 | i386 | samba-common | <Β 2.2.12-1.21as.9.3 | samba-common-2.2.12-1.21as.9.3.i386.rpm |
CentOS | 2 | i386 | samba-swat | <Β 2.2.12-1.21as.9.3 | samba-swat-2.2.12-1.21as.9.3.i386.rpm |