Brian Gorenc discovered that Samba incorrectly calculated array bounds when handling remote procedure calls (RPC) over the network. A remote, unauthenticated attacker could exploit this to execute arbitrary code as the root user. Updated packages are available from security.ubuntu.com.
========================================================================== Ubuntu Security Notice USN-1423-1 April 13, 2012 samba vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 11.10 - Ubuntu 11.04 - Ubuntu 10.04 LTS - Ubuntu 8.04 LTS Summary: Samba could be made to run programs as the administrator if it received specially crafted network traffic. Software Description: - samba: SMB/CIFS file, print, and login server for Unix Details: Brian Gorenc discovered that Samba incorrectly calculated array bounds when handling remote procedure calls (RPC) over the network. A remote, unauthenticated attacker could exploit this to execute arbitrary code as the root user. (CVE-2012-1182) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 11.10: samba 2:3.5.11~dfsg-1ubuntu2.2 Ubuntu 11.04: samba 2:3.5.8~dfsg-1ubuntu2.4 Ubuntu 10.04 LTS: samba 2:3.4.7~dfsg-1ubuntu3.9 Ubuntu 8.04 LTS: samba 3.0.28a-1ubuntu4.18 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1423-1 CVE-2012-1182 Package Information: https://launchpad.net/ubuntu/+source/samba/2:3.5.11~dfsg-1ubuntu2.2 https://launchpad.net/ubuntu/+source/samba/2:3.5.8~dfsg-1ubuntu2.4 https://launchpad.net/ubuntu/+source/samba/2:3.4.7~dfsg-1ubuntu3.9 https://launchpad.net/ubuntu/+source/samba/3.0.28a-1ubuntu4.18