SERVER-SAMBA -- Snort has detected traffic exploiting vulnerabilities in Samba servers.
SERVER-SAMBA Samba write and close command memory leak attempt
This event is generated when a crafted malicious SMB packet is intended to leak the memory of a Samba server in a file via a write operation on a Samba share. Impact: Attempted User Privilege Gain Details: This vulnerability relies in the way how the Samba server is not able to check the correct range of data length that a SMB client states is going to send, hence the client can send more data and make the Samba server to leak some sections of it's memory into the content of the file the client wants to write. The client is not able to choose what memory section leak, though. Even though this vulnerability is present in deprecated SMB protocol commands, the vulnerable functions are still present in the code, hence if an authenticated SMB client uses the vulnerable commands, will be able to exploit this vulnerability Ease of Attack: Hard
No information provided
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
None
No information provided
None