Samba Fragment Reassembly Overflow
Publish Date: 15 febbraio 2011
Gravità: : Critico
Identificatori CVE: CVE-2003-0085
Data notifica: 15 febbraio 2011
Descrizione
Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code.
Informazioni esposizione:
Trend Micro Deep Security shields networks through Deep Packet Inspection (DPI) rules. Trend Micro customers using OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities. Please refer to the filter number and filter name when applying appropriate DPI and/or IDF rules.
Soluzioni
Trend Micro Deep Security DPI Rule Number: 1001202
Trend Micro Deep Security DPI Rule Name: 1001202 - Identified Suspicious Usage Of Shellcode Encoders
Software e versione interessati:
- HP CIFS/9000 Server A.01.05
- HP CIFS/9000 Server A.01.06
- HP CIFS/9000 Server A.01.07
- HP CIFS/9000 Server A.01.08
- HP CIFS/9000 Server A.01.08.01
- HP CIFS/9000 Server A.01.09
- HP CIFS/9000 Server A.01.09.01
- Samba Samba 2.0.0
- Samba Samba 2.0.1
- Samba Samba 2.0.10
- Samba Samba 2.0.2
- Samba Samba 2.0.3
- Samba Samba 2.0.4
- Samba Samba 2.0.5
- Samba Samba 2.0.6
- Samba Samba 2.0.7
- Samba Samba 2.0.8
- Samba Samba 2.0.9
- Samba Samba 2.2 .0
- Samba Samba 2.2 .0a
- Samba Samba 2.2.1a
- Samba Samba 2.2.2
- Samba Samba 2.2.3
- Samba Samba 2.2.3a
- Samba Samba 2.2.4
- Samba Samba 2.2.5
- Samba Samba 2.2.6
- Samba Samba 2.2.7
- Samba Samba 2.2.7a