Lucene search

K
ubuntuUbuntuUSN-556-1
HistoryDec 18, 2007 - 12:00 a.m.

Samba vulnerability

2007-12-1800:00:00
ubuntu.com
39

7.5 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%

Releases

  • Ubuntu 7.10
  • Ubuntu 7.04
  • Ubuntu 6.10
  • Ubuntu 6.06

Packages

  • samba -

Details

Alin Rad Pop discovered that Samba did not correctly check the size
of reply packets to mailslot requests. If a server was configured
with domain logon enabled, an unauthenticated remote attacker could send
a specially crafted domain logon packet and execute arbitrary code or
crash the Samba service. By default, domain logon is disabled in Ubuntu.

OSVersionArchitecturePackageVersionFilename
Ubuntu7.10noarchlibsmbclient<Β 3.0.26a-1ubuntu2.3UNKNOWN
Ubuntu7.10noarchlibpam-smbpass<Β 3.0.26a-1ubuntu2.3UNKNOWN
Ubuntu7.10noarchlibsmbclient-dev<Β 3.0.26a-1ubuntu2.3UNKNOWN
Ubuntu7.10noarchsamba<Β 3.0.26a-1ubuntu2.3UNKNOWN
Ubuntu7.10noarchsamba-common<Β 3.0.26a-1ubuntu2.3UNKNOWN
Ubuntu7.10noarchsamba-dbg<Β 3.0.26a-1ubuntu2.3UNKNOWN
Ubuntu7.10noarchsmbclient<Β 3.0.26a-1ubuntu2.3UNKNOWN
Ubuntu7.10noarchsmbfs<Β 3.0.26a-1ubuntu2.3UNKNOWN
Ubuntu7.10noarchswat<Β 3.0.26a-1ubuntu2.3UNKNOWN
Ubuntu7.10noarchwinbind<Β 3.0.26a-1ubuntu2.3UNKNOWN
Rows per page:
1-10 of 431

7.5 High

AI Score

Confidence

Low

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%