File: 3029.txt

package info (click to toggle)
snort 2.9.7.0-5
  • links: PTS, VCS
  • area: main
  • in suites: bullseye, buster, sid, stretch
  • size: 55,000 kB
  • ctags: 38,464
  • sloc: ansic: 266,667; sh: 12,508; makefile: 2,908; yacc: 497; perl: 496; lex: 261; sed: 14
file content (67 lines) | stat: -rw-r--r-- 1,592 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
Rule: 

--
Sid: 
3029

-- 
Summary: 
This event is generated when an attempt is made to exploit a known
vulnerability in a Samba implementation.

-- 
Impact: 
Serious. Possible execution of arbitrary code.

--
Detailed Information:
Samba is a file and print serving system for heterogenous networks. It
is available for use as a service and client on UNIX/Linux systems and as
a client for Microsoft Windows systems.

Samba uses the SMB/CIFS protocols to allow communication between client
and server. The SMB protocol contains many commands and is commonly used
to control network devices and systems from a remote location. A
vulnerability exists in the way the smb daemon processes commands sent by
a client system when accessing resources on the remote server.The problem
exists in the allocation of memory which can be exploited by an attacker
to cause an integer overflow, possibly leading to the execution of
arbitrary code on the affected system with the privileges of the user
running the smbd process.

--
Affected Systems:
	Samba 3.0.8 and prior

--
Attack Scenarios: 
An attacker needs to supply specially crafted data to the smb daemon to
overflow a buffer containing the information for the access control lists
to be applied to files in the smb query.

-- 
Ease of Attack: 
Difficult.

-- 
False Positives:
None Known

--
False Negatives:
None Known

-- 
Corrective Action: 
Apply the appropriate vendor supplied patch

--
Contributors: 
Sourcefire Research Team
Brian Caswell <bmc@sourcefire.com>
Nigel Houghton <nigel.houghton@sourcefire.com>

-- 
Additional References:

--