Lucene search

K
ubuntuUbuntuUSN-987-1
HistorySep 14, 2010 - 12:00 a.m.

Samba vulnerability

2010-09-1400:00:00
ubuntu.com
37

7.4 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.915 High

EPSS

Percentile

98.9%

Releases

  • Ubuntu 10.04
  • Ubuntu 9.10
  • Ubuntu 9.04
  • Ubuntu 8.04
  • Ubuntu 6.06

Packages

  • samba -

Details

Andrew Bartlett discovered that Samba did not correctly validate the
length when parsing SIDs. A remote attacker could send a specially crafted
request to the server and cause a denial of service, or possibly execute
arbitrary code with the privileges of the Samba service (smbd).

The default compiler options for Ubuntu 8.04 LTS and newer should reduce
the vulnerability to a denial of service.

OSVersionArchitecturePackageVersionFilename
Ubuntu9.10noarchsamba< 2:3.4.0-3ubuntu5.7UNKNOWN
Ubuntu9.10noarchlibpam-smbpass< 2:3.4.0-3ubuntu5.7UNKNOWN
Ubuntu9.10noarchlibsmbclient< 2:3.4.0-3ubuntu5.7UNKNOWN
Ubuntu9.10noarchlibsmbclient-dev< 2:3.4.0-3ubuntu5.7UNKNOWN
Ubuntu9.10noarchlibwbclient0< 2:3.4.0-3ubuntu5.7UNKNOWN
Ubuntu9.10noarchsamba-common-bin< 2:3.4.0-3ubuntu5.7UNKNOWN
Ubuntu9.10noarchsamba-dbg< 2:3.4.0-3ubuntu5.7UNKNOWN
Ubuntu9.10noarchsamba-tools< 2:3.4.0-3ubuntu5.7UNKNOWN
Ubuntu9.10noarchsmbclient< 2:3.4.0-3ubuntu5.7UNKNOWN
Ubuntu9.10noarchsmbfs< 2:3.4.0-3ubuntu5.7UNKNOWN
Rows per page:
1-10 of 571

7.4 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.915 High

EPSS

Percentile

98.9%