Description
Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1590-1 | New samba packages fix arbitrary code execution |
Ubuntu USN |
USN-617-1 | Samba vulnerabilities |
Ubuntu USN |
USN-617-2 | Samba regression |
References
History
No history.
Status: PUBLISHED
Assigner: flexera
Published:
Updated: 2024-08-07T08:08:57.737Z
Reserved: 2008-02-29T00:00:00.000Z
Link: CVE-2008-1105
No data.
Status : Modified
Published: 2008-05-29T16:32:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2008-1105
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN