First published: Thu Feb 17 2011(Updated: )
A flaw was found in the way Samba handles the file descriptor sets (fd_set) datastructure. The Samba codebase uses file descriptor sets in various places. The fd_set structure is a fixed size defined by the FD_SETSIZE variable. If a file descriptor with a value greater than or equal to FD_SETSIZE is added to a set, it can set a single bit on the stack to a '1'. In Red Hat Enterprise Linux, all samba processes except for smbd have a limit set which prevents a process from allocating more than 1024 file descriptors by default. 1024 is the value of FD_SETSIZE on Red Hat Enterprise Linux. smbd does not cap the maximum allowed file descriptors below 1024. This means that if a remote attacker has the ability to open files on a Samba server, they may be able to flip arbitrary stack bits to a '1'. It is not currently believed that this flaw can be used for arbitrary code execution, but the possibility should not be ruled out. Acknowledgements: Red Hat would like to thank the Samba team for reporting this issue. Upstream acknowledges Volker Lendecke of SerNet as the original reporter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | =3.0.0 | |
Samba | =3.0.1 | |
Samba | =3.0.2 | |
Samba | =3.0.2-a | |
Samba | =3.0.2a | |
Samba | =3.0.3 | |
Samba | =3.0.4 | |
Samba | =3.0.4-rc1 | |
Samba | =3.0.5 | |
Samba | =3.0.6 | |
Samba | =3.0.7 | |
Samba | =3.0.8 | |
Samba | =3.0.9 | |
Samba | =3.0.10 | |
Samba | =3.0.11 | |
Samba | =3.0.12 | |
Samba | =3.0.13 | |
Samba | =3.0.14 | |
Samba | =3.0.14-a | |
Samba | =3.0.14a | |
Samba | =3.0.15 | |
Samba | =3.0.16 | |
Samba | =3.0.17 | |
Samba | =3.0.18 | |
Samba | =3.0.19 | |
Samba | =3.0.20 | |
Samba | =3.0.20-a | |
Samba | =3.0.20-b | |
Samba | =3.0.20a | |
Samba | =3.0.20b | |
Samba | =3.0.21 | |
Samba | =3.0.21-a | |
Samba | =3.0.21-b | |
Samba | =3.0.21-c | |
Samba | =3.0.21a | |
Samba | =3.0.21b | |
Samba | =3.0.21c | |
Samba | =3.0.22 | |
Samba | =3.0.23 | |
Samba | =3.0.23-a | |
Samba | =3.0.23-b | |
Samba | =3.0.23-c | |
Samba | =3.0.23-d | |
Samba | =3.0.23a | |
Samba | =3.0.23b | |
Samba | =3.0.23c | |
Samba | =3.0.23d | |
Samba | =3.0.24 | |
Samba | =3.0.25 | |
Samba | =3.0.25-a | |
Samba | =3.0.25-b | |
Samba | =3.0.25-c | |
Samba | =3.0.25-pre1 | |
Samba | =3.0.25-pre2 | |
Samba | =3.0.25-rc1 | |
Samba | =3.0.25-rc2 | |
Samba | =3.0.25-rc3 | |
Samba | =3.0.25a | |
Samba | =3.0.25b | |
Samba | =3.0.25c | |
Samba | =3.0.26 | |
Samba | =3.0.26-a | |
Samba | =3.0.26a | |
Samba | =3.0.27 | |
Samba | =3.0.27-a | |
Samba | =3.0.28 | |
Samba | =3.0.28-a | |
Samba | =3.0.29 | |
Samba | =3.0.30 | |
Samba | =3.0.31 | |
Samba | =3.0.32 | |
Samba | =3.0.33 | |
Samba | =3.0.34 | |
Samba | =3.0.35 | |
Samba | =3.0.36 | |
Samba | =3.0.37 | |
Samba | =3.1.0 | |
Samba | =3.2.0 | |
Samba | =3.2.1 | |
Samba | =3.2.2 | |
Samba | =3.2.3 | |
Samba | =3.2.4 | |
Samba | =3.2.5 | |
Samba | =3.2.6 | |
Samba | =3.2.7 | |
Samba | =3.2.8 | |
Samba | =3.2.9 | |
Samba | =3.2.10 | |
Samba | =3.2.11 | |
Samba | =3.2.12 | |
Samba | =3.2.13 | |
Samba | =3.2.14 | |
Samba | =3.2.15 | |
Samba | =3.3.0 | |
Samba | =3.3.1 | |
Samba | =3.3.2 | |
Samba | =3.3.3 | |
Samba | =3.3.4 | |
Samba | =3.3.5 | |
Samba | =3.3.6 | |
Samba | =3.3.7 | |
Samba | =3.3.8 | |
Samba | =3.3.9 | |
Samba | =3.3.10 | |
Samba | =3.3.11 | |
Samba | =3.3.12 | |
Samba | =3.3.13 | |
Samba | =3.3.14 | |
Samba | =3.4.0 | |
Samba | =3.4.1 | |
Samba | =3.4.2 | |
Samba | =3.4.3 | |
Samba | =3.4.4 | |
Samba | =3.4.5 | |
Samba | =3.4.6 | |
Samba | =3.4.7 | |
Samba | =3.4.8 | |
Samba | =3.4.9 | |
Samba | =3.4.10 | |
Samba | =3.4.11 | |
Samba | =3.5.0 | |
Samba | =3.5.1 | |
Samba | =3.5.2 | |
Samba | =3.5.3 | |
Samba | =3.5.4 | |
Samba | =3.5.5 | |
Samba | =3.5.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.