First published: Tue Apr 10 2012(Updated: )
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | <=3.4.15 | |
Samba | =3.0.0 | |
Samba | =3.0.1 | |
Samba | =3.0.2 | |
Samba | =3.0.2-a | |
Samba | =3.0.2a | |
Samba | =3.0.3 | |
Samba | =3.0.4 | |
Samba | =3.0.4-rc1 | |
Samba | =3.0.5 | |
Samba | =3.0.6 | |
Samba | =3.0.7 | |
Samba | =3.0.8 | |
Samba | =3.0.9 | |
Samba | =3.0.10 | |
Samba | =3.0.11 | |
Samba | =3.0.12 | |
Samba | =3.0.13 | |
Samba | =3.0.14 | |
Samba | =3.0.14-a | |
Samba | =3.0.14a | |
Samba | =3.0.15 | |
Samba | =3.0.16 | |
Samba | =3.0.17 | |
Samba | =3.0.18 | |
Samba | =3.0.19 | |
Samba | =3.0.20 | |
Samba | =3.0.20-a | |
Samba | =3.0.20-b | |
Samba | =3.0.20a | |
Samba | =3.0.20b | |
Samba | =3.0.21 | |
Samba | =3.0.21-a | |
Samba | =3.0.21-b | |
Samba | =3.0.21-c | |
Samba | =3.0.21a | |
Samba | =3.0.21b | |
Samba | =3.0.21c | |
Samba | =3.0.22 | |
Samba | =3.0.23 | |
Samba | =3.0.23-a | |
Samba | =3.0.23-b | |
Samba | =3.0.23-c | |
Samba | =3.0.23-d | |
Samba | =3.0.23a | |
Samba | =3.0.23b | |
Samba | =3.0.23c | |
Samba | =3.0.23d | |
Samba | =3.0.24 | |
Samba | =3.0.25 | |
Samba | =3.0.25-a | |
Samba | =3.0.25-b | |
Samba | =3.0.25-c | |
Samba | =3.0.25-pre1 | |
Samba | =3.0.25-pre2 | |
Samba | =3.0.25-rc1 | |
Samba | =3.0.25-rc2 | |
Samba | =3.0.25-rc3 | |
Samba | =3.0.25a | |
Samba | =3.0.25b | |
Samba | =3.0.25c | |
Samba | =3.0.26 | |
Samba | =3.0.26-a | |
Samba | =3.0.26a | |
Samba | =3.0.27 | |
Samba | =3.0.27-a | |
Samba | =3.0.28 | |
Samba | =3.0.28-a | |
Samba | =3.0.29 | |
Samba | =3.0.30 | |
Samba | =3.0.31 | |
Samba | =3.0.32 | |
Samba | =3.0.33 | |
Samba | =3.0.34 | |
Samba | =3.0.35 | |
Samba | =3.0.36 | |
Samba | =3.0.37 | |
Samba | =3.1.0 | |
Samba | =3.2.0 | |
Samba | =3.2.1 | |
Samba | =3.2.2 | |
Samba | =3.2.3 | |
Samba | =3.2.4 | |
Samba | =3.2.5 | |
Samba | =3.2.6 | |
Samba | =3.2.7 | |
Samba | =3.2.8 | |
Samba | =3.2.9 | |
Samba | =3.2.10 | |
Samba | =3.2.11 | |
Samba | =3.2.12 | |
Samba | =3.2.13 | |
Samba | =3.2.14 | |
Samba | =3.2.15 | |
Samba | =3.3.0 | |
Samba | =3.3.1 | |
Samba | =3.3.2 | |
Samba | =3.3.3 | |
Samba | =3.3.4 | |
Samba | =3.3.5 | |
Samba | =3.3.6 | |
Samba | =3.3.7 | |
Samba | =3.3.8 | |
Samba | =3.3.9 | |
Samba | =3.3.10 | |
Samba | =3.3.11 | |
Samba | =3.3.12 | |
Samba | =3.3.13 | |
Samba | =3.3.14 | |
Samba | =3.3.15 | |
Samba | =3.3.16 | |
Samba | =3.4.0 | |
Samba | =3.4.1 | |
Samba | =3.4.2 | |
Samba | =3.4.3 | |
Samba | =3.4.4 | |
Samba | =3.4.5 | |
Samba | =3.4.6 | |
Samba | =3.4.7 | |
Samba | =3.4.8 | |
Samba | =3.4.9 | |
Samba | =3.4.10 | |
Samba | =3.4.11 | |
Samba | =3.4.12 | |
Samba | =3.4.13 | |
Samba | =3.4.14 | |
Samba | =3.5.0 | |
Samba | =3.5.1 | |
Samba | =3.5.2 | |
Samba | =3.5.3 | |
Samba | =3.5.4 | |
Samba | =3.5.5 | |
Samba | =3.5.6 | |
Samba | =3.5.7 | |
Samba | =3.5.8 | |
Samba | =3.5.9 | |
Samba | =3.5.10 | |
Samba | =3.5.11 | |
Samba | =3.5.12 | |
Samba | =3.5.13 | |
Samba | =3.6.0 | |
Samba | =3.6.1 | |
Samba | =3.6.2 | |
Samba | =3.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1182 has a CVSS score indicating a high severity vulnerability that allows remote code execution.
To fix CVE-2012-1182, upgrade Samba to version 3.4.16, 3.5.14, or 3.6.4 or later.
CVE-2012-1182 affects Samba versions prior to 3.4.16, 3.5.14, and 3.6.4.
Yes, CVE-2012-1182 can be exploited by remote attackers through crafted RPC calls.
Any systems running the affected versions of Samba are vulnerable to CVE-2012-1182.