Vulnerability Details : CVE-2011-0719
Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.
Vulnerability category: Memory CorruptionDenial of service
Products affected by CVE-2011-0719
- cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-0719
18.03%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-0719
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2011-0719
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0719
-
http://www.samba.org/samba/history/samba-3.3.15.html
-
http://secunia.com/advisories/43517
Sign inVendor Advisory
-
http://secunia.com/advisories/43482
Sign inVendor Advisory
-
http://www.vupen.com/english/advisories/2011/0519
Webmail | OVH- OVHVendor Advisory
-
http://samba.org/samba/security/CVE-2011-0719.html
Vendor Advisory
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:038
mandriva.com
-
http://secunia.com/advisories/43556
Sign inVendor Advisory
-
http://www.vupen.com/english/advisories/2011/0517
Webmail | OVH- OVHVendor Advisory
-
http://marc.info/?l=bugtraq&m=130835366526620&w=2
'[security bulletin] HPSBUX02657 SSRT100460 rev.1 - CIFS Server (Samba), Remote Execution of Arbitrar' - MARC
-
http://www.redhat.com/support/errata/RHSA-2011-0306.html
SupportVendor Advisory
-
http://www.samba.org/samba/history/samba-3.5.7.html
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056241.html
[SECURITY] Fedora 14 Update: samba-3.5.8-74.fc14
-
http://support.apple.com/kb/HT4723
About the security content of Mac OS X v10.6.8 and Security Update 2011-004 - Apple Support
-
http://www.ubuntu.com/usn/USN-1075-1
USN-1075-1: Samba vulnerability | Ubuntu security notices
-
http://www.samba.org/samba/history/samba-3.4.12.html
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/65724
Samba FD_SET denial of service CVE-2011-0719 Vulnerability Report
-
http://secunia.com/advisories/43843
Sign inVendor Advisory
-
http://www.vupen.com/english/advisories/2011/0518
Webmail | OVH- OVHVendor Advisory
-
http://www.vupen.com/english/advisories/2011/0702
Webmail | OVH- OVHVendor Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=678328
678328 – (CVE-2011-0719) CVE-2011-0719 Samba unsafe fd_set usagePatch
-
http://www.vupen.com/english/advisories/2011/0541
Webmail | OVH- OVHVendor Advisory
-
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056229.html
[SECURITY] Fedora 13 Update: samba-3.5.8-74.fc13
-
http://www.debian.org/security/2011/dsa-2175
Debian -- Security Information -- DSA-2175-1 samba
-
http://www.redhat.com/support/errata/RHSA-2011-0305.html
SupportVendor Advisory
-
http://secunia.com/advisories/43557
Sign inVendor Advisory
-
http://www.securitytracker.com/id?1025132
Samba FD_SET Stack Corruption Flaw Lets Remote and Local Users Deny Service - SecurityTracker
-
http://www.vupen.com/english/advisories/2011/0522
Webmail | OVH- OVHVendor Advisory
-
http://www.securityfocus.com/bid/46597
Samba 'FD_SET' Memory Corruption Vulnerability
-
http://secunia.com/advisories/43512
Sign inVendor Advisory
-
http://www.vupen.com/english/advisories/2011/0520
Webmail | OVH- OVHVendor Advisory
-
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
Apple - Lists.apple.com
-
http://secunia.com/advisories/43503
Sign inVendor Advisory
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593629
The Slackware Linux Project: Slackware Security Advisories
Jump to