First published: Mon Feb 20 2012(Updated: )
A flaw was found in the way Samba handled Any Batched (AndX) request packets. A malicious request could cause smbd to enter an infinite recursion and overflow heap-based buffer during recursive calls. This can be triggered by an unauthenticated attacker, resulting in smbd child process crash or possibly code execution.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | =3.0.0 | |
Rim Blackberry Playbook Tablet | ||
Rim Blackberry Playbook Os | <=2.0 | |
Rim Blackberry Playbook Os | =1.0 | |
Rim Blackberry Playbook Os | =1.0.3 | |
Rim Blackberry Playbook Os | =1.0.5 | |
Rim Blackberry Playbook Os | =1.0.6 | |
Rim Blackberry Playbook Os | =1.0.7 | |
Rim Blackberry Playbook Os | =1.0.7.2942 | |
Rim Blackberry Playbook Os | =1.0.7.3312 | |
Rim Blackberry Playbook Os | =1.0.8.4985 | |
Rim Blackberry Playbook Os | =1.0.8.6067 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.