Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git%3Ba=commit%3Bh=7b0c8fcff47a885743125dd843db64af41af5a61 - | |
References | () http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git%3Ba=commit%3Bh=968460ebd8006d55661dec0fb86712b40d71c413 - | |
References | () http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=27b87fe52baba0a55e9723030e76fce94fabcea4 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00005.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html - Mailing List, Third Party Advisory | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=oss-security&m=124099284225229&w=2 - Mailing List, Third Party Advisory | |
References | () http://marc.info/?l=oss-security&m=124099371726547&w=2 - Mailing List, Third Party Advisory | |
References | () http://secunia.com/advisories/35217 - Third Party Advisory | |
References | () http://secunia.com/advisories/35226 - Third Party Advisory | |
References | () http://secunia.com/advisories/35298 - Third Party Advisory | |
References | () http://secunia.com/advisories/35656 - Third Party Advisory | |
References | () http://secunia.com/advisories/35847 - Third Party Advisory | |
References | () http://secunia.com/advisories/36051 - Third Party Advisory | |
References | () http://secunia.com/advisories/36327 - Third Party Advisory | |
References | () http://secunia.com/advisories/37351 - Third Party Advisory | |
References | () http://secunia.com/advisories/37471 - Third Party Advisory | |
References | () http://wiki.rpath.com/Advisories:rPSA-2009-0111 - Broken Link | |
References | () http://www.debian.org/security/2009/dsa-1809 - Third Party Advisory | |
References | () http://www.debian.org/security/2009/dsa-1844 - Third Party Advisory | |
References | () http://www.debian.org/security/2009/dsa-1865 - Third Party Advisory | |
References | () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29.4 - Vendor Advisory | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2009:148 - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2009/05/14/1 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2009/05/14/4 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2009/05/15/2 - Mailing List, Patch, Third Party Advisory | |
References | () http://www.redhat.com/support/errata/RHSA-2009-1157.html - Third Party Advisory | |
References | () http://www.securityfocus.com/archive/1/505254/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/archive/1/507985/100/0/threaded - Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/34612 - Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/usn-793-1 - Third Party Advisory | |
References | () http://www.vmware.com/security/advisories/VMSA-2009-0016.html - Third Party Advisory | |
References | () http://www.vupen.com/english/advisories/2009/3316 - Third Party Advisory | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=496572 - Issue Tracking, Patch, Third Party Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8588 - Third Party Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9525 - Third Party Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01126.html - Patch, Third Party Advisory | |
References | () https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01271.html - Third Party Advisory |
07 Nov 2023, 02:03
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2009-05-28 20:30
Updated : 2024-11-21 01:02
NVD link : CVE-2009-1633
Mitre link : CVE-2009-1633
CVE.ORG link : CVE-2009-1633
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
canonical
- ubuntu_linux
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer