SMB: Samba SMB1 Packets Chaining Memory Corruption
This signature detects attempts to exploit a known memory corruption vulnerability in Samba. It is due to improper validation when chaining SMB1 packets. Remote attackers can exploit this by sending a crafted SMB message to a target SMB server. A successful attack can result in remote code execution with root privileges.
Extended Description
Samba is prone to an unspecified memory-corruption vulnerability. Attackers can exploit this issue to execute arbitrary code in the context of the application. Failed attacks may cause a denial-of-service condition. Samba versions prior to 3.3.13 are vulnerable.
Affected Products
Xerox workcentre,Avaya messaging_storage_server
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Samba
Suse
Apple
Gentoo
Hp
Sun
Rpath
Avaya
Xerox
Pardus
Slackware
Ubuntu
Mandriva
Debian
Vmware
7.5