CVE-2012-1182

Samba < 3.4.15 - Numeric Error

Title source: rule

Description

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/21850
metasploit WORKING POC NORMAL
by Unknown, blasty, mephos, sinn3r, juan vazquez · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/samba/setinfopolicy_heap.rb

References (27)

... and 7 more

Scores

EPSS 0.7681
EPSS Percentile 99.0%

Details

CWE
CWE-189
Status published
Products (37)
samba/samba 3.0.0
samba/samba 3.0.1
samba/samba 3.0.2 (2 CPE variants)
samba/samba 3.0.2a
samba/samba 3.0.3
samba/samba 3.0.4 (2 CPE variants)
samba/samba 3.0.5
samba/samba 3.0.6
samba/samba 3.0.7
samba/samba 3.0.8
... and 27 more
Published Apr 10, 2012
Tracked Since Feb 18, 2026