samba vulnerability

Related Vulnerabilities: CVE-2012-1182  

Samba could be made to run programs as the administrator if it received specially crafted network traffic.

Brian Gorenc discovered that Samba incorrectly calculated array bounds when handling remote procedure calls (RPC) over the network. A remote, unauthenticated attacker could exploit this to execute arbitrary code as the root user. (CVE-2012-1182)

13 April 2012

samba vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 11.10
  • Ubuntu 11.04
  • Ubuntu 10.04 LTS
  • Ubuntu 8.04 LTS

Summary

Samba could be made to run programs as the administrator if it received specially crafted network traffic.

Software Description

  • samba - SMB/CIFS file, print, and login server for Unix

Details

Brian Gorenc discovered that Samba incorrectly calculated array bounds when handling remote procedure calls (RPC) over the network. A remote, unauthenticated attacker could exploit this to execute arbitrary code as the root user. (CVE-2012-1182)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 11.10
samba - 2:3.5.11~dfsg-1ubuntu2.2
Ubuntu 11.04
samba - 2:3.5.8~dfsg-1ubuntu2.4
Ubuntu 10.04 LTS
samba - 2:3.4.7~dfsg-1ubuntu3.9
Ubuntu 8.04 LTS
samba - 3.0.28a-1ubuntu4.18

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References