Samba Fragment Reassembly Overflow
Data de publicação: 15 fevereiro 2011
Schweregrad: : Crítico
Identificador(es) CVE: : CVE-2003-0085
Data do informe: 15 fevereiro 2011
Descrição
Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code.
Exposição das informações
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Solução
Trend Micro Deep Security DPI Rule Number: 1001202
Trend Micro Deep Security DPI Rule Name: 1001202 - Identified Suspicious Usage Of Shellcode Encoders
Software infectado e versão:
- HP CIFS/9000 Server A.01.05
- HP CIFS/9000 Server A.01.06
- HP CIFS/9000 Server A.01.07
- HP CIFS/9000 Server A.01.08
- HP CIFS/9000 Server A.01.08.01
- HP CIFS/9000 Server A.01.09
- HP CIFS/9000 Server A.01.09.01
- Samba Samba 2.0.0
- Samba Samba 2.0.1
- Samba Samba 2.0.10
- Samba Samba 2.0.2
- Samba Samba 2.0.3
- Samba Samba 2.0.4
- Samba Samba 2.0.5
- Samba Samba 2.0.6
- Samba Samba 2.0.7
- Samba Samba 2.0.8
- Samba Samba 2.0.9
- Samba Samba 2.2 .0
- Samba Samba 2.2 .0a
- Samba Samba 2.2.1a
- Samba Samba 2.2.2
- Samba Samba 2.2.3
- Samba Samba 2.2.3a
- Samba Samba 2.2.4
- Samba Samba 2.2.5
- Samba Samba 2.2.6
- Samba Samba 2.2.7
- Samba Samba 2.2.7a