Samba.NDR.Parsing.DNSP.Name.Integer.Overflow
Description
This indicates an attack attempt to exploit an Integer Overflow vulnerability in Samba.
The vulnerability is due to an error in ndr_pull_dnsp_name function when the affected software handles a maliciously crafted packet. A remote attacker may be able to exploit this to execute arbitrary code on the affected machine. Also, a remote attacker can exploit this to cause a denial of service condition on the affected server.
Affected Products
Samba Team Samba 4.3.x prior to 4.3.13
Samba Team Samba 4.4.x prior to 4.4.8
Samba Team Samba 4.5.x prior to 4.5.3
Impact
System Compromise: Remote attackers can gain control of vulnerable systems
Recommended Actions
Apply the most recent upgrade or patch from the vendor
https://www.samba.org/samba/security/CVE-2016-2123.html
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |