CVE-2010-2063

Samba < 3.3.12 - Memory Corruption

Title source: rule

Description

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux_x86
https://www.exploit-db.com/exploits/16860
metasploit WORKING POC GOOD
by Jun Mao, jduck · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/samba/chain_reply.rb

References (34)

... and 14 more

Scores

EPSS 0.7754
EPSS Percentile 99.0%

Details

CWE
CWE-119
Status published
Products (5)
canonical/ubuntu_linux 6.06
canonical/ubuntu_linux 8.04
canonical/ubuntu_linux 9.04
debian/debian_linux 5.0
samba/samba 3.0.0 - 3.3.12
Published Jun 17, 2010
Tracked Since Feb 18, 2026