Samba sec_io_acl Heap Overflow VulnerabilityZDI-07-032: July 11th, 2007
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 5316. For further product information on the TippingPoint IPS:
This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Samba. User interaction is not required to exploit this vulnerability.
The specific flaw exists in the parsing of RPC requests to the SRVSVC RPC interface. When parsing a request to NetSetFileSecurity, heap allocation is calculated based on user input. By specifying invalid values, heap blocks can be overwritten leading to remote code execution.
Vendor ResponseSamba has issued an update to correct this vulnerability. More details can be found at:
2007-04-25 - Vulnerability reported to vendor
2007-07-11 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: