Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2010-2063

Published: 16 June 2010

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

Priority

High

Status

Package Release Status
samba
Launchpad, Ubuntu, Debian
upstream Not vulnerable

dapper
Released (3.0.22-1ubuntu3.12)
hardy
Released (3.0.28a-1ubuntu4.12)
jaunty
Released (2:3.3.2-1ubuntu3.5)
karmic Not vulnerable

lucid Not vulnerable