Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2013-4408 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue does not affect the version of samba as shipped with Red Hat Enterprise Linux 5.
Base Score | 6.8 |
---|---|
Base Metrics | AV:N/AC:M/Au:N/C:P/I:P/A:P |
Access Vector | Network |
Access Complexity | Medium |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Enterprise Linux 6 (samba) | RHSA-2013:1806 | 2013-12-10 |
Red Hat Enterprise Linux 6 (samba4) | RHSA-2013:1805 | 2013-12-09 |
Red Hat Enterprise Linux 5 (samba3x) | RHSA-2013:1806 | 2013-12-10 |
Red Hat Storage Server 2.1 (samba) | RHSA-2014:0009 | 2014-01-06 |
Platform | Package | State |
---|---|---|
Red Hat Enterprise Linux 7 | samba | Not affected |
Red Hat Enterprise Linux 5 | samba | Not affected |