Samba SID解析远程栈溢出漏洞(CVE-2010-3069)
Samba是一套实现SMB(Server Messages Block)协议、跨平台进行文件共享和打印共享服务的程序。Samba的sid_parse()函数及相关的dom_sid_parse()函数中在读取Windows SID(Security ID)的二进制表示时没有正确地检查输入长度,恶意的客户端可以发送sid溢出smbd服务器中用于存储SID的栈变量,导致执行任意代码。<*来源:Andrew Bartlett 链接:http://secunia.com/advisories/41354/ http://us1.samba.org/samba/security/CVE-2010-3069.html https://rhn.redhat.com/errata/RHSA-2010-0698.html https://rhn.redhat.com/errata/RHSA-2010-0697.html*>解决方法 厂商补丁:Samba-----目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:http://us1.samba.org/samba/history/samba-3.5.5.html对于具体Linux发行版本中使用的版本,可以参考如下链接,确认是否受该漏洞影响:Redhat:http://www.redhat.com/support/errata/RHSA-2010-0860.htmlFedora:http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.htmlhttp://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.htmlVmware:http://www.vmware.com/security/advisories/VMSA-2010-0019.htmlUbuntu:http://www.ubuntu.com/usn/USN-987-1Suse:http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.htmlhttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html