CVE-2010-3069
Published: 14 September 2010
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Priority
Status
Package | Release | Status |
---|---|---|
samba Launchpad, Ubuntu, Debian |
upstream |
Released
(3.5.5)
|
dapper |
Released
(3.0.22-1ubuntu3.13)
|
|
hardy |
Released
(3.0.28a-1ubuntu4.13)
|
|
jaunty |
Released
(2:3.3.2-1ubuntu3.6)
|
|
karmic |
Released
(2:3.4.0-3ubuntu5.7)
|
|
lucid |
Released
(2:3.4.7~dfsg-1ubuntu3.2)
|
|
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu. |