[SAMBA] CVE-2008-1105 - Boundary failure when parsing SMB responses

Gerald (Jerry) Carter jerry at samba.org
Wed May 28 14:56:38 GMT 2008

Hash: SHA1

== Subject:     Boundary failure when parsing SMB responses
==              can result in a buffer overrun
== CVE ID#:     CVE-2008-1105
== Versions:    Samba 3.0.0 - 3.0.29 (inclusive)
== Summary:     Specifically crafted SMB responses can result
==              in a heap overflow in the Samba client code.
==              Because the server process, smbd, can itself
==              act as a client during operations such as
==              printer notification and domain authentication,
==              this issue affects both Samba client and server
==              installations.


Secunia Research reported a vulnerability that allows for
the execution of arbitrary code in smbd.  This defect is
is a result of an incorrect buffer size when parsing SMB
replies in the routine receive_smb_raw().

Patch Availability

A patch addressing this defect has been posted to


Additionally, Samba 3.0.30 has been issued as a security
release to correct the defect.  Samba administrators are
advised to upgrade to 3.0.30 or apply the patch as soon
as possible.


This vulnerability was reported to Samba developers by
Alin Rad Pop, Secunia Research.

The time line is as follows:

* May 15, 2008: Initial report to security at samba.org.
* May 15, 2008: First response from Samba developers confirming
  the bug along with a proposed patch.
* May 28, 2008: Public security advisory made available.

== Our Code, Our Bugs, Our Responsibility.
== The Samba Team

Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org


More information about the samba-announce mailing list