CVE-2010-2063
Samba < 3.3.12 - Memory Corruption
Title source: ruleDescription
Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux_x86
https://www.exploit-db.com/exploits/16860
metasploit
WORKING POC
GOOD
by Jun Mao, jduck · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/samba/chain_reply.rb
References (34)
Scores
EPSS
0.7754
EPSS Percentile
99.0%
Details
CWE
CWE-119
Status
published
Products (5)
canonical/ubuntu_linux
6.06
canonical/ubuntu_linux
8.04
canonical/ubuntu_linux
9.04
debian/debian_linux
5.0
samba/samba
3.0.0 - 3.3.12
Published
Jun 17, 2010
Tracked Since
Feb 18, 2026