Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x prior to 3.3.13 allows remote malicious users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
samba samba |
||
canonical ubuntu linux 9.04 |
||
canonical ubuntu linux 8.04 |
||
canonical ubuntu linux 6.06 |
||
debian debian linux 5.0 |