Your submission was sent successfully! Close

You have successfully unsubscribed! Close

CVE-2010-3069

Published: 14 September 2010

Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.

Priority

Medium

Status

Package Release Status
samba
Launchpad, Ubuntu, Debian
upstream
Released (3.5.5)
dapper
Released (3.0.22-1ubuntu3.13)
hardy
Released (3.0.28a-1ubuntu4.13)
jaunty
Released (2:3.3.2-1ubuntu3.6)
karmic
Released (2:3.4.0-3ubuntu5.7)
lucid
Released (2:3.4.7~dfsg-1ubuntu3.2)
This vulnerability is mitigated in part by the use of gcc's stack protector in Ubuntu.