CVE-2012-1182

CVE Details

Release Date:2012-04-10

Description


The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

See more information about CVE-2012-1182 from MITRE CVE dictionary and NIST NVD


CVSS v2.0 metrics


NOTE: The following CVSS v2.0 metrics and score provided are preliminary and subject to review.

Base Score: 8.3 Base Metrics: AV:A/AC:L/Au:N/C:C/I:C/A:C
Access Vector: Adjacent network Attack Complexity: Low
Authentication: None required Confidentiality Impact: Complete
Integrity Impact: Complete Availability Impact: Complete

Errata information


PlatformErrataRelease Date
Oracle Enterprise Linux version 4 (samba)ELSA-2012-04782012-04-16
Oracle Linux version 5 (samba)ELSA-2012-04652012-04-10
Oracle Linux version 5 (samba3x)ELSA-2012-04662012-04-10
Oracle Linux version 6 (evolution-mapi)ELSA-2013-05152013-02-27
Oracle Linux version 6 (openchange)ELSA-2013-05152013-02-27
Oracle Linux version 6 (samba)ELSA-2012-04652012-04-10
Oracle Linux version 6 (samba4)ELSA-2013-05062013-02-27



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete