Description
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
Published: 2010-09-15
Score: 7.5 High
EPSS: 16.6% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2109-1 New samba packages fix buffer overflow
Ubuntu USN Ubuntu USN USN-987-1 Samba vulnerability
References
Link Providers
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.html cve-icon cve-icon
http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=130835366526620&w=2 cve-icon cve-icon
http://secunia.com/advisories/41354 cve-icon cve-icon
http://secunia.com/advisories/41447 cve-icon cve-icon
http://secunia.com/advisories/42531 cve-icon cve-icon
http://secunia.com/advisories/42885 cve-icon cve-icon
http://support.apple.com/kb/HT4581 cve-icon cve-icon
http://support.apple.com/kb/HT4723 cve-icon cve-icon
http://us1.samba.org/samba/history/samba-3.5.5.html cve-icon cve-icon
http://us1.samba.org/samba/security/CVE-2010-3069.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2010-0860.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/515055/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/43212 cve-icon cve-icon
http://www.securitytracker.com/id?1024434 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-987-1 cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2010-0019.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/2378 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/3126 cve-icon cve-icon
http://www.vupen.com/english/advisories/2011/0091 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/61773 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2010-3069 cve-icon
https://www.cve.org/CVERecord?id=CVE-2010-3069 cve-icon
History

No history.

Subscriptions

Canonical Ubuntu Linux
Redhat Enterprise Linux Rhel Eus
Samba Samba
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T02:55:46.813Z

Reserved: 2010-08-20T00:00:00.000Z

Link: CVE-2010-3069

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2010-09-15T18:00:44.400

Modified: 2026-04-29T01:13:23.040

Link: CVE-2010-3069

cve-icon Redhat

Severity : Critical

Publid Date: 2010-09-14T00:00:00Z

Links: CVE-2010-3069 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses