Buffer overflow in samba (Alpine package)



Published: 2016-03-15
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2016-0771
CWE-ID CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
samba (Alpine package)
Operating systems & Components / Operating system package or component

Vendor Alpine Linux Development Team

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Buffer overflow

EUVDB-ID: #VU32319

Risk: Medium

CVSSv3.1: 5.2 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2016-0771

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote authenticated user to #BASIC_IMPACT#.

The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record.

Mitigation

Install update from vendor's website.

Vulnerable software versions

samba (Alpine package): 3.4.8-r0 - 4.1.22-r0

External links

http://git.alpinelinux.org/aports/commit/?id=28c16dde691b571c23ec2674ca1653901ba30bc5
http://git.alpinelinux.org/aports/commit/?id=090786571b7ca65b5494d0d389da987fbca799e3
http://git.alpinelinux.org/aports/commit/?id=e44afa81c87bd2e939a9335a4a0f79e9d2e29a6b


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###