A heap-based buffer overflow vulnerability was found in Samba within the GSSAPI unwrap_des() and unwrap_des3() routines of Heimdal. The DES and Triple-DES decryption routines in the Heimdal GSSAPI library allow a length-limited write buffer overflow on malloc() allocated memory when presented with a maliciously small packet. This flaw allows a remote user to send specially crafted malicious data to the application, possibly resulting in a denial of service (DoS) attack.
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Name | Vendor | Start Version | End Version |
---|---|---|---|
Samba | Samba | 4.0.0 (including) | 4.15.11 (excluding) |
Samba | Samba | 4.16.0 (including) | 4.16.6 (excluding) |
Samba | Samba | 4.17.0 (including) | 4.17.2 (excluding) |
Heimdal | Ubuntu | bionic | * |
Heimdal | Ubuntu | esm-apps/jammy | * |
Heimdal | Ubuntu | esm-infra/xenial | * |
Heimdal | Ubuntu | focal | * |
Heimdal | Ubuntu | jammy | * |
Heimdal | Ubuntu | kinetic | * |
Heimdal | Ubuntu | trusty | * |
Heimdal | Ubuntu | trusty/esm | * |
Heimdal | Ubuntu | upstream | * |
Heimdal | Ubuntu | xenial | * |
Samba | Ubuntu | bionic | * |
Samba | Ubuntu | devel | * |
Samba | Ubuntu | esm-infra/bionic | * |
Samba | Ubuntu | focal | * |
Samba | Ubuntu | jammy | * |
Samba | Ubuntu | kinetic | * |
Samba | Ubuntu | lunar | * |
Samba | Ubuntu | mantic | * |
Samba | Ubuntu | noble | * |
Samba | Ubuntu | oracular | * |
Samba | Ubuntu | trusty | * |
Samba | Ubuntu | trusty/esm | * |
Samba | Ubuntu | upstream | * |
Samba | Ubuntu | xenial | * |