Bug 795509 (CVE-2012-0870) - CVE-2012-0870 samba: Any Batched ("AndX") request processing infinite recursion and heap-based buffer overflow
Summary: CVE-2012-0870 samba: Any Batched ("AndX") request processing infinite recursi...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-0870
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 795717 795718 795719 796133 796134
Blocks: 795554
TreeView+ depends on / blocked
 
Reported: 2012-02-20 18:33 UTC by Jan Lieskovsky
Modified: 2023-05-13 01:14 UTC (History)
10 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-02-24 13:35:29 UTC
Embargoed:


Attachments (Terms of Use)
Proposed upstream patch against the v3.0 version (2.83 KB, patch)
2012-02-20 19:01 UTC, Jan Lieskovsky
no flags Details | Diff


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:0332 0 normal SHIPPED_LIVE Critical: samba security update 2012-02-24 01:21:40 UTC

Description Jan Lieskovsky 2012-02-20 18:33:48 UTC
A flaw was found in the way Samba handled Any Batched (AndX) request packets. A malicious request could cause smbd to enter an infinite recursion and overflow heap-based buffer during recursive calls. This can be triggered by an unauthenticated attacker, resulting in smbd child process crash or possibly code execution.

Comment 1 Jan Lieskovsky 2012-02-20 19:01:45 UTC
Created attachment 564503 [details]
Proposed upstream patch against the v3.0 version

Comment 4 Jan Lieskovsky 2012-02-20 21:05:23 UTC
This issue affects the versions of the samba package, as shipped with Red Hat Enterprise Linux 4 and 5.

--

This issue did NOT affect the versions of the samba and samba4x package, as shipped with Red Hat Enterprise Linux 6.

--

This issue did NOT affect the versions of the samba package, as shipped with Fedora release of 15 and 16.

Comment 13 Huzaifa S. Sidhpurwala 2012-02-22 05:16:48 UTC
This is public via:

http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB29565

Comment 16 Jan Lieskovsky 2012-02-22 15:46:04 UTC
Acknowledgements:


Red Hat would like to thank the Samba team for reporting this issue.
Upstream acknowledges Andy Davis of NGS Secure as the original reporter.

Comment 17 errata-xmlrpc 2012-02-23 20:24:54 UTC
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4
  Red Hat Enterprise Linux 5.6 EUS - Server Only
  Red Hat Enterprise Linux 5
  Red Hat Enterprise Linux 5.3 Long Life

Via RHSA-2012:0332 https://rhn.redhat.com/errata/RHSA-2012-0332.html

Comment 18 Jan Lieskovsky 2012-02-24 09:55:15 UTC
Upstream advisory:
http://www.samba.org/samba/security/CVE-2012-0870

Comment 19 Jan Lieskovsky 2012-02-24 13:02:40 UTC
Statement:

This issue did not affect samba3x packages as shipped with Red Hat Enterprise Linux 5 and samba packages as shipped with Red Hat Enterprise Linux 6, as it only affected Samba versions prior to 3.4.0. This issue was addressed in samba packages in Red Hat Enterprise Linux 4 and 5 via RHSA-2012:0332.

Comment 20 Jan Lieskovsky 2012-02-24 13:33:45 UTC
External Reference:

http://www.samba.org/samba/security/CVE-2012-0870


Note You need to log in before you can comment on or make changes to this bug.