Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
13 Feb 2023, 04:46
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet. |
02 Feb 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | CVE-2013-4408 samba: Heap-based buffer overflow due to incorrect DCE-RPC fragment length field check |
Information
Published : 2013-12-10 06:14
Updated : 2023-12-10 11:16
NVD link : CVE-2013-4408
Mitre link : CVE-2013-4408
CVE.ORG link : CVE-2013-4408
JSON object : View
Products Affected
samba
- samba
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer