Advisory Details

January 20th, 2017

Samba NDR Parsing ndr_pull_dnsp_name Heap-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-17-053
ZDI-CAN-3995

CVE ID CVE-2016-2123
CVSS SCORE 6.8, AV:N/AC:M/Au:N/C:P/I:P/A:P
AFFECTED VENDORS Samba
AFFECTED PRODUCTS 4.x
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samba. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of NDR data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code under the context of current process.

ADDITIONAL DETAILS Samba has issued an update to correct this vulnerability. More details can be found at:
https://www.samba.org/samba/security/CVE-2016-2123.html
DISCLOSURE TIMELINE
  • 2016-11-04 - Vulnerability reported to vendor
  • 2017-01-20 - Coordinated public release of advisory
CREDIT c4c1234757b4f1e468a29d480d78f21b
Frederic Besler
c692f9f0933f03c265e4c9e2bcc3bb28
BACK TO ADVISORIES