First published: Mon Apr 20 2009(Updated: )
Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | <2.6.29.4 | |
Debian | =4.0 | |
Debian | =5.0 | |
Ubuntu Linux | =6.06 | |
Ubuntu Linux | =8.04 | |
Ubuntu Linux | =8.10 | |
Ubuntu Linux | =9.04 | |
Linux Kernel | <2.6.29.4 | |
Ubuntu | =6.06 | |
Ubuntu | =8.04 | |
Ubuntu | =8.10 | |
Ubuntu | =9.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1633 is considered a moderate severity vulnerability that can lead to denial of service due to memory corruption.
To fix CVE-2009-1633, upgrade the Linux kernel to version 2.6.29.4 or later.
CVE-2009-1633 affects various Linux distributions including Debian 4.0, 5.0 and Ubuntu 6.06, 8.04, 8.10, and 9.04.
CVE-2009-1633 is a buffer overflow vulnerability in the CIFS subsystem of the Linux kernel.
While CVE-2009-1633 primarily causes denial of service, it may indirectly lead to data loss due to memory corruption.