CVE-2011-0719

CVSS V2 Medium 5 CVSS V3 None
Description
Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.
Overview
  • CVE ID
  • CVE-2011-0719
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2011-03-01T23:00:02
  • Last Modified Date
  • 2018-10-30T16:25:59
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
https://bugzilla.redhat.com/show_bug.cgi?id=678328 Patch
http://www.samba.org/samba/history/samba-3.4.12.html
http://www.samba.org/samba/history/samba-3.5.7.html
http://secunia.com/advisories/43512 Vendor Advisory
http://samba.org/samba/security/CVE-2011-0719.html Vendor Advisory
http://www.samba.org/samba/history/samba-3.3.15.html
http://www.redhat.com/support/errata/RHSA-2011-0305.html Vendor Advisory
http://secunia.com/advisories/43482 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0518 Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2011-0306.html Vendor Advisory
http://www.securityfocus.com/bid/46597
http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.593629
http://secunia.com/advisories/43557 Vendor Advisory
http://www.debian.org/security/2011/dsa-2175
http://www.vupen.com/english/advisories/2011/0541 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:038
http://secunia.com/advisories/43503 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0517 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0519 Vendor Advisory
http://www.ubuntu.com/usn/USN-1075-1
http://www.securitytracker.com/id?1025132
http://www.vupen.com/english/advisories/2011/0520 Vendor Advisory
http://www.vupen.com/english/advisories/2011/0522 Vendor Advisory
http://secunia.com/advisories/43556 Vendor Advisory
http://secunia.com/advisories/43517 Vendor Advisory
http://secunia.com/advisories/43843 Vendor Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056229.html
http://lists.fedoraproject.org/pipermail/package-announce/2011-March/056241.html
http://www.vupen.com/english/advisories/2011/0702 Vendor Advisory
http://support.apple.com/kb/HT4723
http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html
http://marc.info/?l=bugtraq&m=130835366526620&w=2
https://exchange.xforce.ibmcloud.com/vulnerabilities/65724
History
Created Old Value New Value Data Type Notes
2022-05-10 18:00:20 Added to TrackCVE