Advisory Details

July 11th, 2007

Samba sec_io_acl Heap Overflow Vulnerability

ZDI-07-032
ZDI-CAN-194

CVE ID CVE-2007-2446
CVSS SCORE
AFFECTED VENDORS Samba
AFFECTED PRODUCTS 3.0.x
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['5316']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Samba. User interaction is not required to exploit this vulnerability.

The specific flaw exists in the parsing of RPC requests to the SRVSVC RPC interface. When parsing a request to NetSetFileSecurity, heap allocation is calculated based on user input. By specifying invalid values, heap blocks can be overwritten leading to remote code execution.

ADDITIONAL DETAILS Samba has issued an update to correct this vulnerability. More details can be found at:
http://us1.samba.org/samba/security/CVE-2007-2446.html
DISCLOSURE TIMELINE
  • 2007-04-25 - Vulnerability reported to vendor
  • 2007-07-11 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES