// For flags

CVE-2008-1105

Samba 3.0.29 (Client) - 'receive_smb_raw()' Buffer Overflow (PoC)

Severity Score

9.1
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.

Desbordamiento de búfer basado en montículo en la función receive_smb_raw de util/sock.c en Samba 3.0.0 hasta 3.0.29, permite a atacantes remotos ejecutar código de su elección a través de una respuesta SMB manipulada.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2008-02-29 CVE Reserved
  • 2008-05-29 CVE Published
  • 2024-08-07 CVE Updated
  • 2024-08-07 First Exploit
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (49)
URL Tag Source
http://lists.vmware.com/pipermail/security-announce/2008/000023.html Mailing List
http://secunia.com/advisories/30228 Third Party Advisory
http://secunia.com/advisories/30385 Third Party Advisory
http://secunia.com/advisories/30396 Third Party Advisory
http://secunia.com/advisories/30442 Third Party Advisory
http://secunia.com/advisories/30449 Third Party Advisory
http://secunia.com/advisories/30478 Third Party Advisory
http://secunia.com/advisories/30489 Third Party Advisory
http://secunia.com/advisories/30543 Third Party Advisory
http://secunia.com/advisories/30736 Third Party Advisory
http://secunia.com/advisories/30802 Third Party Advisory
http://secunia.com/advisories/30835 Third Party Advisory
http://secunia.com/advisories/31246 Third Party Advisory
http://secunia.com/advisories/31911 Third Party Advisory
http://secunia.com/advisories/33696 Third Party Advisory
http://securitytracker.com/id?1020123 Third Party Advisory
http://support.apple.com/kb/HT2163 Third Party Advisory
http://wiki.rpath.com/Advisories:rPSA-2008-0180 Broken Link
http://www.securityfocus.com/archive/1/492683/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/492737/100/0/threaded Mailing List
http://www.securityfocus.com/archive/1/492903/100/0/threaded Mailing List
http://www.securityfocus.com/bid/31255 Third Party Advisory
http://www.xerox.com/downloads/usa/en/c/cert_XRX08_009.pdf Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/42664 Vdb Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/45251 Vdb Entry
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10020 Signature
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5733 Signature
URL Date SRC
http://www.securityfocus.com/bid/29404 2022-08-29
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Samba
Search vendor "Samba"
Samba
Search vendor "Samba" for product "Samba"
>= 3.0.0 <= 3.0.29
Search vendor "Samba" for product "Samba" and version " >= 3.0.0 <= 3.0.29"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
6.06
Search vendor "Canonical" for product "Ubuntu Linux" and version "6.06"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
7.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "7.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
7.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "7.10"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
8.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "8.04"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
4.0
Search vendor "Debian" for product "Debian Linux" and version "4.0"
-
Affected