[Bug 235912] Re: [CVE-2008-1105] Samba: boundary failure when parsing SMB responses
Launchpad Bug Tracker
235912 at bugs.launchpad.net
Tue Jun 17 22:06:35 BST 2008
This bug was fixed in the package samba - 3.0.24-2ubuntu1.6
---------------
samba (3.0.24-2ubuntu1.6) feisty-security; urgency=low
* SECURITY UPDATE: heap overflow when processing crafted SMB responses
* debian/patches/security-CVE-2008-1105.patch: update util_sock.c to require
specifying the buffer size and update client.c, smbctool.c, smbfilter.c,
and process.c for these changes
* SECURITY UPDATE: buffer overrun in nmbd when processing crafted GETDC
mailslot requests
* debian/patches/security_CVE-2007-4572.patch: check return values and
sizeof strings in charcnv.c, ntlmssp_parse.c, nmbd_processlogon.c.
Backport regression fixes from upstream.
* References:
CVE-2008-1105
CVE-2007-4572
LP: #235912
-- Jamie Strandboge <jamie at ubuntu.com> Mon, 16 Jun 2008 14:24:29
-0400
--
[CVE-2008-1105] Samba: boundary failure when parsing SMB responses
https://bugs.launchpad.net/bugs/235912
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in ubuntu.
More information about the Ubuntu-server-bugs
mailing list