Security: Patche for CVE-2008-1105.
authorGerald W. Carter <jerry@samba.org>
Wed, 28 May 2008 12:30:19 +0000 (07:30 -0500)
committerGerald W. Carter <jerry@samba.org>
Wed, 28 May 2008 15:26:27 +0000 (10:26 -0500)
commitfa07a60da640795513c40e6c23589847a01e9372
tree3ee9ef855f7185bd37c88587beac5a3eca5019a7
parent159946915fe35cab1d0fe2deef8547b720ccc011
Security: Patche for CVE-2008-1105.

    -- Summary --
    Specifically crafted SMB responses can result
    in a heap overflow in the Samba client code.
    Because the server process, smbd, can itself
    act as a client during operations such as
    printer notification and domain authentication,
    this issue affects both Samba client and server
    installations.

Ensure that we specify the buffer size used to store incoming SMB
packets.  This bug was originally introduced in Samba 2.2.4.  Patch from
Jeremy Allison.
source/client/client.c
source/client/smbctool.c
source/lib/util_sock.c
source/libsmb/clientgen.c
source/smbd/process.c
source/utils/smbfilter.c