Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
13 Feb 2023, 04:19
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet. |
02 Feb 2023, 17:17
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | CVE-2010-2063 samba: memory corruption vulnerability |
29 Aug 2022, 20:11
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) http://www.samba.org/samba/ftp/history/samba-3.3.13.html - Vendor Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=130835366526620&w=2 - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://www.samba.org/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch - Patch, Vendor Advisory | |
References | (SECUNIA) http://secunia.com/advisories/40293 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html - Mailing List, Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/1517 - Permissions Required | |
References | (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/59481 - Third Party Advisory, VDB Entry | |
References | (UBUNTU) http://ubuntu.com/usn/usn-951-1 - Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/1505 - Permissions Required | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12427 - Third Party Advisory | |
References | (IDEFENSE) http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=873 - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2010-0488.html - Third Party Advisory | |
References | (DEBIAN) http://www.debian.org/security/2010/dsa-2061 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/40221 - Third Party Advisory | |
References | (BID) http://www.securityfocus.com/bid/40884 - Third Party Advisory, VDB Entry | |
References | (SLACKWARE) http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.471914 - Mailing List, Third Party Advisory | |
References | (MLIST) http://marc.info/?l=samba-announce&m=127668712312761&w=2 - Mailing List, Patch, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/42319 - Third Party Advisory | |
References | (OSVDB) http://osvdb.org/65518 - Broken Link | |
References | (APPLE) http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html - Mailing List, Third Party Advisory | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859 - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/40145 - Third Party Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=129138831608422&w=2 - Mailing List, Third Party Advisory | |
References | (CONFIRM) http://www.samba.org/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch - Patch, Vendor Advisory | |
References | (CONFIRM) http://support.apple.com/kb/HT4312 - Third Party Advisory | |
References | (CONFIRM) http://www.samba.org/samba/security/CVE-2010-2063.html - Vendor Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/1504 - Permissions Required | |
References | (SECUNIA) http://secunia.com/advisories/40210 - Third Party Advisory | |
References | (SECTRACK) http://www.securitytracker.com/id?1024107 - Third Party Advisory, VDB Entry | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/3063 - Permissions Required | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7115 - Third Party Advisory | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/1486 - Permissions Required | |
References | (VUPEN) http://www.vupen.com/english/advisories/2010/1507 - Permissions Required | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDVSA-2010:119 - Third Party Advisory | |
First Time |
Canonical
Debian debian Linux Debian Canonical ubuntu Linux |
|
CPE | cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:* cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:* |
Information
Published : 2010-06-17 16:30
Updated : 2023-12-10 11:03
NVD link : CVE-2010-2063
Mitre link : CVE-2010-2063
CVE.ORG link : CVE-2010-2063
JSON object : View
Products Affected
debian
- debian_linux
samba
- samba
canonical
- ubuntu_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer