Pardus: 2010-91: Samba: Memory Corruption
Posted by Benjamin D. Thomas   
A vulnerability has been fixed in Samba, which can be exploited by malicious people to potentially compromise a vulnerable system.
------------------------------------------------------------------------
Pardus Linux Security Advisory 2010-91            security@pardus.org.tr
------------------------------------------------------------------------
      Date: 2010-06-30
  Severity: 3
      Type: Remote
------------------------------------------------------------------------

Summary
======
A vulnerability has been fixed in Samba,  which  can  be  exploited  by
malicious people to potentially compromise a vulnerable system.


Description
==========
CVE-2010-2063:

Buffer overflow in the  SMB1  packet  chaining  implementation  in  the
chain_reply function in process.c in smbd in Samba 3.0.x before  3.3.13
allows remote attackers to cause a denial of service (memory corruption
and daemon crash) or possibly execute arbitrary code via a crafted field
in a packet.


Affected packages:

  Pardus 2009:
    samba, all before 3.3.10-53-14


Resolution
=========
There are update(s) for samba. You can update them via Package  Manager
or with a single command from console:

    pisi up samba

References
=========
  * http://bugs.pardus.org.tr/show_bug.cgi?id477

------------------------------------------------------------------------