CVE-2012-1182
Samba < 3.4.15 - Numeric Error
Title source: ruleDescription
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/21850
metasploit
WORKING POC
NORMAL
by Unknown, blasty, mephos, sinn3r, juan vazquez · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/samba/setinfopolicy_heap.rb
References (27)
... and 7 more
Scores
EPSS
0.7681
EPSS Percentile
99.0%
Details
CWE
CWE-189
Status
published
Products (37)
samba/samba
3.0.0
samba/samba
3.0.1
samba/samba
3.0.2 (2 CPE variants)
samba/samba
3.0.2a
samba/samba
3.0.3
samba/samba
3.0.4 (2 CPE variants)
samba/samba
3.0.5
samba/samba
3.0.6
samba/samba
3.0.7
samba/samba
3.0.8
... and 27 more
Published
Apr 10, 2012
Tracked Since
Feb 18, 2026