SMB: Samba NDR Parsing ndr_pull_dnsp_name Integer Overflow
An integer overflow vulnerability exists in Samba. The vulnerability is due to incorrectly parsing crafted NDR data in the ndr_pull_dnsp_name() function, resulting in an integer overflow that leads to a heap buffer overflow. A remote, authenticated attacker could exploit this vulnerability by sending malicious packets to a vulnerable Samba service configured as an Active Directory Domain Controller. A successful attack could result in arbitrary code execution with the root privileges while an unsuccessful attack will cause the service to terminate or stop responding.
Extended Description
A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation.
Affected Products
Samba samba
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Samba
6.5