A flaw was found in the way Samba handled Any Batched (AndX) request packets. A malicious request could cause smbd to enter an infinite recursion and overflow heap-based buffer during recursive calls. This can be triggered by an unauthenticated attacker, resulting in smbd child process crash or possibly code execution.
Created attachment 564503 [details] Proposed upstream patch against the v3.0 version
This issue affects the versions of the samba package, as shipped with Red Hat Enterprise Linux 4 and 5. -- This issue did NOT affect the versions of the samba and samba4x package, as shipped with Red Hat Enterprise Linux 6. -- This issue did NOT affect the versions of the samba package, as shipped with Fedora release of 15 and 16.
This is public via: http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB29565
Acknowledgements: Red Hat would like to thank the Samba team for reporting this issue. Upstream acknowledges Andy Davis of NGS Secure as the original reporter.
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5.6 EUS - Server Only Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 5.3 Long Life Via RHSA-2012:0332 https://rhn.redhat.com/errata/RHSA-2012-0332.html
Upstream advisory: http://www.samba.org/samba/security/CVE-2012-0870
Statement: This issue did not affect samba3x packages as shipped with Red Hat Enterprise Linux 5 and samba packages as shipped with Red Hat Enterprise Linux 6, as it only affected Samba versions prior to 3.4.0. This issue was addressed in samba packages in Red Hat Enterprise Linux 4 and 5 via RHSA-2012:0332.
External Reference: http://www.samba.org/samba/security/CVE-2012-0870