First published: Wed Sep 15 2010(Updated: )
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | >=3.0.0<=3.3.14 | |
Samba | >=3.4.0<3.4.9 | |
Samba | >=3.5.0<3.5.5 | |
Ubuntu | =9.04 | |
Ubuntu | =9.10 | |
Ubuntu | =8.04 | |
Ubuntu | =10.04 | |
Ubuntu | =6.06 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3069 has a high severity rating due to its potential for remote code execution and denial of service.
To fix CVE-2010-3069, upgrade Samba to version 3.5.5 or later.
CVE-2010-3069 allows remote attackers to perform denial of service attacks and potentially execute arbitrary code.
CVE-2010-3069 affects Samba versions prior to 3.5.5, including 3.3.x and 3.4.x.
Exploiting CVE-2010-3069 can lead to crashes of the Samba service and allow attackers to gain unauthorized control.