Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 31 May 2010 14:57:19 +0200
From: Tomas Hoger <thoger@...hat.com>
To: oss-security@...ts.openwall.com
Cc: eren@...dus.org.tr
Subject: Re: Fwd: [Full-disclosure] stratsec Security
 Advisory SS-2010-005: Samba Multiple DoS Vulnerabilities (3.3.x)

On Fri, 28 May 2010 16:45:21 +0300 Eren Türkay wrote:

> > NULL deref CVE-2010-1635 should only affect 3.5.x, as it occurs in
> > this code, which does not exist in 3.4.x:
> > 
> > http://git.samba.org/?p=samba.git;a=commitdiff;h=c116652a3050a854
> > 
> > On 3.3.x, reproducer causes smbd to follow error code path where
> > smb_panic is called.
> 
> Thanks. To summarize, 3.3.x is only affected by OOB read
> (CVE-2010-1642) As smbd follows error code path where smb_panic is
> called, I guess we can say that 3.3.x is not affected by
> CVE-2010-1642.

You should not hit the same NULL deref in 3.3.x as was reported for
3.5.x. The impact is rather similar though, smbd child exits with back
trace in the log and (optionally) core file.

-- 
Tomas Hoger / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.