SMB: Samba SMB1 Packets Chaining Memory Corruption

This signature detects attempts to exploit a known memory corruption vulnerability in Samba. It is due to improper validation when chaining SMB1 packets. Remote attackers can exploit this by sending a crafted SMB message to a target SMB server. A successful attack can result in remote code execution with root privileges.

Extended Description

Samba is prone to an unspecified memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the application. Failed attacks may cause a denial-of-service condition. Samba versions prior to 3.3.13 are vulnerable.

Affected Products

Xerox workcentre,Avaya messaging_storage_server

Short Name
SMB:EXPLOIT:SMB1-CHAINING-MC
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SMB
Keywords
CVE-2010-2063 Chaining Corruption Memory Packets SMB1 Samba bid:40884
Release Date
10/01/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3339
False Positive
Unknown
Vendors

Red_hat

Samba

Suse

Apple

Gentoo

Hp

Sun

Rpath

Avaya

Xerox

Pardus

Slackware

Ubuntu

Mandriva

Debian

Vmware

CVSS Score

7.5

Found a potential security threat?