Oval Definition:oval:org.mitre.oval:def:12336
Revision Date:2015-02-23Version:24
Title:DSA-2109-1 samba -- buffer overflow
Description:A vulnerability has been discovered in samba, a SMB/CIFS file, print, and login server for Unix. The sid_parse function does not correctly check its input lengths when reading a binary representation of a Windows SID. This allows a malicious client to send a sid that can overflow the stack variable that is being used to store the SID in the Samba smbd server. For the stable distribution, this problem has been fixed in version 2:3.2.5-4lenny13. For the testing distribution and the unstable distribution, this problem will be fixed in version 3.5.5~dfsg-1. We recommend that you upgrade your samba packages. The packages for the mips architecture are not included in this upgrade. They will be released as soon as they become available.
Family:unixClass:patch
Status:ACCEPTEDReference(s):CVE-2010-3069
DSA-2109-1
Platform(s):Debian GNU/Linux 5.0
Product(s):samba
Definition Synopsis
  • Debian GNU/Linux 5.0 is installed
  • AND Architecture section
  • Architecture independet section
  • Installed architecture is all
  • AND Packages section
  • samba-doc DPKG is earlier than 2:3.2.5-4lenny13
  • OR samba-doc-pdf DPKG is earlier than 2:3.2.5-4lenny13
  • OR smbfs DPKG is earlier than 2:3.2.5-4lenny13
  • OR samba DPKG is earlier than 2:3.2.5-4lenny13
  • OR samba-tools DPKG is earlier than 2:3.2.5-4lenny13
  • OR winbind DPKG is earlier than 2:3.2.5-4lenny13
  • OR smbclient DPKG is earlier than 2:3.2.5-4lenny13
  • OR libwbclient0 DPKG is earlier than 2:3.2.5-4lenny13
  • OR swat DPKG is earlier than 2:3.2.5-4lenny13
  • OR samba-dbg DPKG is earlier than 2:3.2.5-4lenny13
  • OR libsmbclient-dev DPKG is earlier than 2:3.2.5-4lenny13
  • OR samba-common DPKG is earlier than 2:3.2.5-4lenny13
  • OR libpam-smbpass DPKG is earlier than 2:3.2.5-4lenny13
  • OR libsmbclient DPKG is earlier than 2:3.2.5-4lenny13
  • BACK