Short Name |
SMB:SAMBA:SPOOLSS-NOTIFY |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMB |
Keywords |
Samba SPOOLSS RPC smb_io_notify_option_type_data Request Handling Buffer Overflow |
Release Date |
2010/10/11 |
Update Number |
1789 |
Supported Platforms |
idp-4.0+, isg-3.1.134269+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Samba SPOOLSS service. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the affected application.
Samba is prone to a remote heap-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. An attacker can exploit this issue to execute arbitrary code with superuser privileges, facilitating the complete remote compromise of affected computers. Failed exploit attempts will result in a denial of service. This issue affects Samba 3.0.25rc3 and prior versions.