Advisory Details

July 11th, 2007

Samba smb_io_notify_option_type_data Heap Overflow Vulnerability

ZDI-07-031
ZDI-CAN-193

CVE ID CVE-2007-2446
CVSS SCORE
AFFECTED VENDORS Samba
AFFECTED PRODUCTS 3.0.x
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['5318']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Samba. User interaction is not required to exploit this vulnerability.

The specific flaw exists in the parsing of RPC requests to the SPOOLSS RPC interface. When parsing a request to RFNPCNEX, heap allocation is calculated based on user input. By specifying invalid values, heap blocks can be overwritten leading to remote code execution.

ADDITIONAL DETAILS Samba has issued an update to correct this vulnerability. More details can be found at:
http://us1.samba.org/samba/security/CVE-2007-2446.html
DISCLOSURE TIMELINE
  • 2007-04-25 - Vulnerability reported to vendor
  • 2007-07-11 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES