Advisories Blog | G5 Cyber Security

Zero Day Initiative Advisory 07-032

A vulnerability allows attackers to execute arbitrary code on vulnerable installations of Samba. User interaction is not required to exploit this vulnerability. The specific flaw exists in the parsing of RPC requests to the SRVSVC RPC interface. When parsing a request to NetSetFileSecurity, heap allocation is calculated based on user input. By specifying invalid values, heap blocks can be overwritten leading to remote code execution.

 

You can download this advisory from the following link: https://packetstormsecurity.com/files/download/56806/ZDI-07-032.txt

Source: https://packetstormsecurity.com/files/56806/Zero-Day-Initiative-Advisory-07-032.html

Exit mobile version