CVE-2012-0870
Published: 23 February 2012
Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
Notes
Author | Note |
---|---|
mdeslaur | only affects samba < 3.4.0 |
Priority
Status
Package | Release | Status |
---|---|---|
samba Launchpad, Ubuntu, Debian |
hardy |
Released
(3.0.28a-1ubuntu4.17)
|
lucid |
Not vulnerable
|
|
maverick |
Not vulnerable
|
|
natty |
Not vulnerable
|
|
oneiric |
Not vulnerable
|
|
upstream |
Released
(2:3.4.0~pre1-1)
|
|
Patches: vendor: https://rhn.redhat.com/errata/RHSA-2012-0332.html upstream: http://www.samba.org/samba/ftp/patches/security/samba-3.0-CVE-2012-0870.patch |
References
- http://btsc.webapps.blackberry.com/btsc/search.do?cmd=displayKC&docType=kc&externalId=KB29565
- http://www.securityfocus.com/bid/52103
- http://www.samba.org/samba/security/CVE-2012-0870.html
- https://ubuntu.com/security/notices/USN-1374-1
- https://www.cve.org/CVERecord?id=CVE-2012-0870
- NVD
- Launchpad
- Debian