Bug 804093 (CVE-2012-1182)
Summary: | CVE-2012-1182 samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Jan Lieskovsky <jlieskov> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | urgent | Docs Contact: | |
Priority: | urgent | ||
Version: | unspecified | CC: | asn, bressers, gdeschner, gwync, htaira, jrusnack, mbarnes, mcrha, nsoman, rmainz, sbose, security-response-team, ssorce, steved |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | samba 3.4.16, samba 3.5.14, samba 3.6.4 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2015-01-26 22:31:13 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 804637, 804638, 804639, 804641, 804642, 804644, 804646, 804647, 804650, 804652, 804655, 811392, 812010, 812257, 855232, 865987 | ||
Bug Blocks: | 804113, 855229 |
Description
Jan Lieskovsky
2012-03-16 14:12:07 UTC
This has been corrected in upstream 3.6.4, 3.5.14, and 3.4.16. External References: http://www.samba.org/samba/history/samba-3.6.4.html This issue has been addressed in following products: Red Hat Enterprise Linux 5.6 EUS - Server Only Red Hat Enterprise Linux 5 Via RHSA-2012:0466 https://rhn.redhat.com/errata/RHSA-2012-0466.html This issue has been addressed in following products: Red Hat Enterprise Linux 5.3 Long Life Red Hat Enterprise Linux 5.6 EUS - Server Only Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6.0 EUS - Server Only Red Hat Enterprise Linux 6.1 EUS - Server Only Red Hat Enterprise Linux 6 Via RHSA-2012:0465 https://rhn.redhat.com/errata/RHSA-2012-0465.html Created samba tracking bugs for this issue Affects: fedora-all [bug 811392] Rawhide has been updated, updates have been created for f17, f16 and f15. Created samba4 tracking bugs for this issue Affects: fedora-all [bug 812257] This issue has been addressed in following products: Red Hat Enterprise Linux 4 Extended Lifecycle Support Via RHSA-2012:0478 https://rhn.redhat.com/errata/RHSA-2012-0478.html samba4-4.0.0-38.alpha16.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report. This flaw exists in the samba PIDL code, and therefore affects the PIDL compiler shipped within the samba4 package (samba4-pidl). However we do not ship any daemon with the samba4 package, hence the impact of this flaw on samba4 is very limited. The samba4-pidl compiler is also used to compile code in the openchange and evolution-mapi packages. These contain client side code for exchanging data with MAPI servers. In order to successfully exploit vulnerabilities in these packages, arising out of the above flaw in samba4-pidl, one will need to MITM the connection between these clients and the MAPI servers. Hence the impact on these packages is limited as well. This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0506 https://rhn.redhat.com/errata/RHSA-2013-0506.html This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0515 https://rhn.redhat.com/errata/RHSA-2013-0515.html |