// For flags

CVE-2008-1105

Samba 3.0.29 (Client) - 'receive_smb_raw()' Buffer Overflow (PoC)

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

Desbordamiento de búfer basado en montículo en la función receive_smb_raw de util/sock.c en Samba 3.0.0 hasta 3.0.29, permite a atacantes remotos ejecutar código de su elección a través de una respuesta SMB manipulada.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-02-29 CVE Reserved
  • 2008-05-29 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • 2024-10-31 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (49)
URL Tag Source
http://lists.vmware.com/pipermail/security-announce/2008/000023.html Mailing List
http://secunia.com/advisories/30228 Third Party Advisory
http://secunia.com/advisories/30385 Third Party Advisory
http://secunia.com/advisories/30396 Third Party Advisory
http://secunia.com/advisories/30442 Third Party Advisory
http://secunia.com/advisories/30449 Third Party Advisory
http://secunia.com/advisories/30478 Third Party Advisory
http://secunia.com/advisories/30489 Third Party Advisory
http://secunia.com/advisories/30543 Third Party Advisory
http://secunia.com/advisories/30736 Third Party Advisory
http://secunia.com/advisories/30802 Third Party Advisory
http://secunia.com/advisories/30835 Third Party Advisory
http://secunia.com/advisories/31246 Third Party Advisory
http://secunia.com/advisories/31911 Third Party Advisory
http://secunia.com/advisories/33696 Third Party Advisory
http://securitytracker.com/id?1020123 Third Party Advisory
http://support.apple.com/kb/HT2163 Third Party Advisory
http://wiki.rpath.com/Advisories:rPSA-2008-0180 Broken Link
http://www.securityfocus.com/archive/1/492683/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/492737/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/492903/100/0/threaded Mailing List
http://www.securityfocus.com/bid/31255 Third Party Advisory
http://www.xerox.com/downloads/usa/en/c/cert_XRX08_009.pdf Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/42664 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/45251 Vdb Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10020 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5733 Signature
URL Date SRC
http://www.securityfocus.com/bid/29404 2022-08-29
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Samba
Search vendor "Samba"
Samba
Search vendor "Samba" for product "Samba"
>= 3.0.0 <= 3.0.29
Search vendor "Samba" for product "Samba" and version " >= 3.0.0 <= 3.0.29"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
6.06
Search vendor "Canonical" for product "Ubuntu Linux" and version "6.06"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
7.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "7.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
7.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "7.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
8.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "8.04"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
4.0
Search vendor "Debian" for product "Debian Linux" and version "4.0"
-
Affected