CVE-2012-1182

CVE Details

Release Date:2012-04-10
Impact:Critical What is this?

Description


The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

See more information about CVE-2012-1182 from MITRE CVE dictionary and NIST NVD


NOTE: The following CVSS metrics and score provided are preliminary and subject to review.


CVSS v2 metrics

Base Score: 8.3
Vector String: AV:A/AC:L/Au:N/C:C/I:C/A:C
Version: 2.0
Attack Vector: Adjacent Network
Attack Complexity: Low
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete

Errata information


PlatformErrataRelease Date
Oracle Enterprise Linux version 4 (samba)ELSA-2012-04782012-04-16
Oracle Linux version 5 (samba)ELSA-2012-04652012-04-10
Oracle Linux version 5 (samba3x)ELSA-2012-04662012-04-10
Oracle Linux version 6 (evolution-mapi)ELSA-2013-05152013-02-27
Oracle Linux version 6 (openchange)ELSA-2013-05152013-02-27
Oracle Linux version 6 (samba)ELSA-2012-04652012-04-10
Oracle Linux version 6 (samba4)ELSA-2013-05062013-02-27


This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections:

software.hardware.complete