Pardus: Samba Denial of Service
Posted by Bill Keys   
smbd in Samba 3.0.29 through 3.2.4 might allow remote attackers to read arbitrary memory and cause a denial of service via crafted (1) trans, (2) trans2, and (3) nttrans requests, related to a "cut&paste error" that causes an improper bounds check to be performed.
------------------------------------------------------------------------
Pardus Linux Security Advisory 2008-91            security@pardus.org.tr
------------------------------------------------------------------------
     Date: 2008-12-28
 Severity: 3
     Type: Remote
------------------------------------------------------------------------

Summary
=======

A vulnerability found in Samba  that  can  potentially  leak  arbitrary
memory contents to malicious clients.


Description
===========

smbd in Samba 3.0.29 through 3.2.4 might allow remote attackers to read
arbitrary memory and cause a denial of service via crafted  (1)  trans,
(2) trans2, and (3) nttrans requests, related to  a  "cut&paste  error"
that causes an improper bounds check to be performed.


Affected packages:

 Pardus 2008:
   samba, all before 3.2.6-37-6


Resolution
==========

There are update(s) for samba. You can update them via Package  Manager
or with a single command from console:

   pisi up samba

References
==========

 * http://bugs.pardus.org.tr/show_bug.cgi?id=8890
 * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2008-4314

------------------------------------------------------------------------

--
Pardus Security Team
http://security.pardus.org.tr


_______________________________________________
Pardus-security mailing list
Pardus-security@pardus.org.tr
http://liste.pardus.org.tr/mailman/listinfo/pardus-security