paul Posted September 16, 2010 Report Share Posted September 16, 2010 A vulnerability has been found and corrected in samba: Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share (CVE-2010-3069). The updated packages have been patched to correct this issue. Link to comment Share on other sites More sharing options...
Recommended Posts