Rapid7 Vulnerability & Exploit Database

SUSE Linux Security Vulnerability: CVE-2010-1635

Back to Search

SUSE Linux Security Vulnerability: CVE-2010-1635

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:P)
Published
06/17/2010
Created
07/25/2018
Added
12/12/2013
Modified
07/04/2017

Description

The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.

Solution(s)

  • suse-upgrade-cifs-mount
  • suse-upgrade-ldapsmb
  • suse-upgrade-libnetapi-devel
  • suse-upgrade-libnetapi0
  • suse-upgrade-libsmbclient-devel
  • suse-upgrade-libsmbclient0
  • suse-upgrade-libsmbclient0-32bit
  • suse-upgrade-libsmbsharemodes-devel
  • suse-upgrade-libsmbsharemodes0
  • suse-upgrade-libtalloc-devel
  • suse-upgrade-libtalloc1
  • suse-upgrade-libtalloc1-32bit
  • suse-upgrade-libtdb-devel
  • suse-upgrade-libtdb1
  • suse-upgrade-libtdb1-32bit
  • suse-upgrade-libwbclient-devel
  • suse-upgrade-libwbclient0
  • suse-upgrade-libwbclient0-32bit
  • suse-upgrade-samba
  • suse-upgrade-samba-32bit
  • suse-upgrade-samba-client
  • suse-upgrade-samba-client-32bit
  • suse-upgrade-samba-devel
  • suse-upgrade-samba-doc
  • suse-upgrade-samba-krb-printing
  • suse-upgrade-samba-winbind
  • suse-upgrade-samba-winbind-32bit

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;