CVE-2012-1182 (retired)

Priority
Description
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and
3.6.x before 3.6.4 does not implement validation of an array length in a
manner consistent with validation of array memory allocation, which allows
remote attackers to execute arbitrary code via a crafted RPC call.
Assigned-to
tyhicks
Notes
sbeattiein hardy, the 3.0 reproducer leads to a glibc backtrace
Package
Source: samba (LP Ubuntu Debian)
Upstream:needs-triage
More Information

Updated: 2019-10-09 07:41:30 UTC (commit 33aea848a182c0afcd0a3f927a01a7ecd9a061ee)