Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Ubuntu_linux | Canonical | 10.04 (including) | 10.04 (including) |
Ubuntu_linux | Canonical | 12.04 (including) | 12.04 (including) |
Ubuntu_linux | Canonical | 12.10 (including) | 12.10 (including) |
Ubuntu_linux | Canonical | 13.04 (including) | 13.04 (including) |
Red Hat Enterprise Linux 5 | RedHat | samba3x-0:3.6.6-0.136.el5 | * |
Red Hat Enterprise Linux 5 | RedHat | samba-0:3.0.33-3.40.el5_10 | * |
Red Hat Enterprise Linux 6 | RedHat | samba-0:3.6.9-164.el6 | * |
Red Hat Enterprise Linux 6 | RedHat | samba4-0:4.0.0-58.el6.rc4 | * |
Samba | Ubuntu | lucid | * |
Samba | Ubuntu | precise | * |
Samba | Ubuntu | quantal | * |
Samba | Ubuntu | raring | * |
Samba | Ubuntu | upstream | * |
Samba4 | Ubuntu | lucid | * |
Samba4 | Ubuntu | precise | * |
Samba4 | Ubuntu | quantal | * |
Samba4 | Ubuntu | raring | * |
Samba4 | Ubuntu | saucy | * |
Samba4 | Ubuntu | upstream | * |