Bug 239429 (CVE-2007-2446)

Summary: CVE-2007-2446 samba heap overflows
Product: [Other] Security Response Reporter: Mark J. Cox <mjc>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: mmcallis, security-response-team, ssorce
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: public=20070514,reported=20070507,impact=critical,source=upstream
Fixed In Version: RHSA-2007-0354 Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-05-14 11:21:07 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On: 239430, 239431, 239432, 239433    
Bug Blocks:    

Comment 1 Mark J. Cox 2007-05-11 05:07:42 EDT
According to Samba:

"Various bugs in Samba's NDR parsing can allow a user
to send specially crafted MS-RPC requests that will
overwrite the heap space with user defined data."

These will affect Samba as shipped in Red Hat Enterprise Linux 2.1, 3, 4, 5.


Red Hat would like to thank the Samba developers, TippingPoint, and iDefense for reporting these issues.
Comment 2 Mark J. Cox 2007-05-14 10:05:08 EDT
removing embargo, now public
Comment 3 Red Hat Bugzilla 2007-05-14 11:21:07 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.