Bug 804093 (CVE-2012-1182) - CVE-2012-1182 samba: Multiple heap-based buffer overflows in memory management based on NDR marshalling code output
Summary: CVE-2012-1182 samba: Multiple heap-based buffer overflows in memory managemen...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-1182
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 804637 804638 804639 804641 804642 804644 804646 804647 804650 804652 804655 811392 812010 812257 855232 865987
Blocks: 804113 855229
TreeView+ depends on / blocked
 
Reported: 2012-03-16 14:12 UTC by Jan Lieskovsky
Modified: 2021-06-11 20:40 UTC (History)
14 users (show)

Fixed In Version: samba 3.4.16, samba 3.5.14, samba 3.6.4
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-01-26 22:31:13 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0465 0 normal SHIPPED_LIVE Critical: samba security update 2012-04-11 01:10:53 UTC
Red Hat Product Errata RHSA-2012:0466 0 normal SHIPPED_LIVE Critical: samba3x security update 2012-04-11 00:18:05 UTC
Red Hat Product Errata RHSA-2012:0478 0 normal SHIPPED_LIVE Critical: samba security update 2012-04-13 17:50:17 UTC
Red Hat Product Errata RHSA-2013:0506 0 normal SHIPPED_LIVE Moderate: samba4 security, bug fix and enhancement update 2013-02-20 21:30:25 UTC
Red Hat Product Errata RHSA-2013:0515 0 normal SHIPPED_LIVE Moderate: openchange security, bug fix and enhancement update 2013-02-20 21:29:17 UTC
Samba Project 8815 0 None None None 2019-06-05 06:57:27 UTC

Description Jan Lieskovsky 2012-03-16 14:12:07 UTC
Multiple heap-based buffer overflow flaws were found in the way the code generated by Perl-based DCE/RPC IDL (PIDL) compiler of the Samba suite performed array memory allocation. Memory for an array having an is_size() attribute has been allocated based on the array length, which was provided by the Network Data Representation (NDR) marshalling code (converting parameters provided to the RPC call by the client to the NDR). On the other hand the loop retrieving array elements for a particular array used variable indicated by the size_is() attribute. A remote attacker could provide a specially-crafted remote procedure call (RPC) parameters, which once processed by the marshalling code of the Samba server would lead to Samba daemon (smbd) crash, or, potentially arbitrary code execution with the privileges of the user running the server.

Comment 22 Vincent Danen 2012-04-10 16:44:20 UTC
This has been corrected in upstream 3.6.4, 3.5.14, and 3.4.16.

External References:

http://www.samba.org/samba/history/samba-3.6.4.html

Comment 23 errata-xmlrpc 2012-04-10 20:22:59 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5.6 EUS - Server Only
  Red Hat Enterprise Linux 5

Via RHSA-2012:0466 https://rhn.redhat.com/errata/RHSA-2012-0466.html

Comment 24 errata-xmlrpc 2012-04-10 21:13:14 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5.3 Long Life
  Red Hat Enterprise Linux 5.6 EUS - Server Only
  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 6.0 EUS - Server Only
  Red Hat Enterprise Linux 6.1 EUS - Server Only
  Red Hat Enterprise Linux 6

Via RHSA-2012:0465 https://rhn.redhat.com/errata/RHSA-2012-0465.html

Comment 25 Vincent Danen 2012-04-10 21:35:49 UTC
Created samba tracking bugs for this issue

Affects: fedora-all [bug 811392]

Comment 29 Gwyn Ciesla 2012-04-12 14:56:29 UTC
Rawhide has been updated, updates have been created for f17, f16 and f15.

Comment 30 Huzaifa S. Sidhpurwala 2012-04-13 08:50:14 UTC
Created samba4 tracking bugs for this issue

Affects: fedora-all [bug 812257]

Comment 31 errata-xmlrpc 2012-04-13 13:54:40 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4 Extended Lifecycle Support

Via RHSA-2012:0478 https://rhn.redhat.com/errata/RHSA-2012-0478.html

Comment 34 Fedora Update System 2012-05-15 23:28:25 UTC
samba4-4.0.0-38.alpha16.fc16 has been pushed to the Fedora 16 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 37 Huzaifa S. Sidhpurwala 2012-09-12 10:28:33 UTC
This flaw exists in the samba PIDL code, and therefore affects the PIDL compiler shipped within the samba4 package (samba4-pidl). However we do not ship any daemon with the samba4 package, hence the impact of this flaw on samba4 is very limited.

The samba4-pidl compiler is also used to compile code in the openchange and evolution-mapi packages. These contain client side code for exchanging data with MAPI servers. In order to successfully exploit vulnerabilities in these packages, arising out of the above flaw in samba4-pidl, one will need to MITM the connection between these clients and the MAPI servers. Hence the impact on these packages is limited as well.

Comment 40 errata-xmlrpc 2013-02-21 08:45:59 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:0506 https://rhn.redhat.com/errata/RHSA-2013-0506.html

Comment 41 errata-xmlrpc 2013-02-21 10:20:42 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2013:0515 https://rhn.redhat.com/errata/RHSA-2013-0515.html


Note You need to log in before you can comment on or make changes to this bug.