Short Name |
SMB:SAMBA:LSALOOKUPSIDS |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMB |
Keywords |
Samba LSA RPC lsa_io_trans_names Request Handling Heap Overflow |
Release Date |
2010/10/11 |
Update Number |
1789 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vsrx-12.1+ |
This signature detects attempts to exploit a known heap-based buffer overflow vulnerability in the way Samba handles RPC messages. It is due to a boundary error while performing specific RPC operations. Remote authenticated attackers can exploit this by sending a specially crafted RPC request to the LSA RPC interface. A successful attack allows attackers to execute arbitrary code on the vulnerable system in the context of the affected process commonly the Unix account mapped for the SMB user. The behavior of the target is entirely dependent on the intended function of the injected code. In an unsuccessful attack, if Samba server is running in daemon mode, the child process that handles the attacker's connection does not terminate.
Samba is prone to a remote heap-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code with superuser privileges, facilitating the complete remote compromise of affected computers. Failed exploit attempts will result in a denial of service. This issue affects Samba 3.0.25rc3 and prior versions.