vulnerability alert CVE-2012-1182
Samba: buffer overflow via PIDL
Synthesis of the vulnerability
An unauthenticated attacker can send a malicious RPC query, in order to generate an overflow in Samba, which leads to code execution with root privileges.Impacted products:
Debian, Fedora, HP-UX, MES, Mandriva Linux, NLD, openSUSE, Solaris, RHEL, Samba, SUSE Linux Enterprise Desktop, SLES.
8815, BID-52973, BID-55655, c03365218, CERTA-2012-AVI-210, CVE-2012-1182, DSA-2450-1, FEDORA-2012-5805, FEDORA-2012-5843, FEDORA-2012-6382, HPSBUX02789, MDVSA-2012:055, openSUSE-SU-2012:0507-1, openSUSE-SU-2012:0508-1, RHSA-2012:0466-01, RHSA-2012:0478-01, RHSA-2013:0506-02, RHSA-2013:0515-02, SSRT100824, SUSE-SU-2012:0500-1, SUSE-SU-2012:0501-1, SUSE-SU-2012:0501-2, SUSE-SU-2012:0502-1, SUSE-SU-2012:0504-1, SUSE-SU-2012:0515-1, VIGILANCE-VUL-11531, ZDI-12-063, ZDI-12-064, ZDI-12-068, ZDI-12-069, ZDI-12-070, ZDI-12-071, ZDI-12-072.
Description of the vulnerability
The Samba service implements the SMB/CIFS protocol, and the associated RPC (Remote Procedure Call) features.
The source code of Samba uses PIDL (Perl Interface Definition Language), in order to generate C code implementing RPC interfaces.
The code generated by PIDL uses two variables to store the size of arrays. However, the size indicated by one variable is not checked. So, if this size is too large, a buffer overflow occurs.
An unauthenticated attacker can therefore send a malicious RPC query, in order to generate an overflow in Samba, which leads to code execution with root privileges.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides system vulnerability analysis
. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.