CVE Reference: CVE-2013-4408

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2013-4408

Description:
Heap-based buffer overflow in the dcerpc_read_ncacn_packet_done function in librpc/rpc/dcerpc_util.c in winbindd in Samba 3.x before 3.6.22, 4.0.x before 4.0.13, and 4.1.x before 4.1.3 allows remote AD domain controllers to execute arbitrary code via an invalid fragment length in a DCE-RPC packet.

CVE Status:
Candidate

References:

UBUNTU
  http://www.ubuntu.com/usn/USN-2054-1

SUSE
  http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html
  http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html
  http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html

REDHAT
  http://rhn.redhat.com/errata/RHSA-2014-0009.html
  http://rhn.redhat.com/errata/RHSA-2013-1806.html
  http://rhn.redhat.com/errata/RHSA-2013-1805.html

MANDRIVA
  http://www.mandriva.com/security/advisories?name=MDVSA-2013:299

GENTOO
  http://security.gentoo.org/glsa/glsa-201502-15.xml

DEBIAN
  http://www.debian.org/security/2013/dsa-2812

CONFIRM
  http://www.samba.org/samba/security/CVE-2013-4408
  http://www.samba.org/samba/ftp/patches/security/samba-4.1.2-CVE-2013-4408-CVE-2012-6150.patch

BID
  64191


Return to the previous page.