Overview
The pam_smb module contains a remotely exploitable buffer overflow vulnerability. This module is used to authenticate users using an external Server Message Block (SMB) server. A remote attacker may be able to exploit this vulnerability to run arbitrary commands on the system.
Description
| The pam_smb module versions 1.1.6 and prior contain a remotely exploitable buffer overflow vulnerability in the processing of the password buffer. This module is used when a system is configured to authenticate users using an external Server Message Block (SMB) server. | 
Impact
| An unauthenticated remote attacker may be able to exploit this vulnerability to run arbitrary commands on the system. | 
Solution
| This problem is reportedly resolved in version 1.1.7 of the pam_smb module. Upgrade, or apply the patches provided by your vendor. | 
Vendor Information
CVSS Metrics
| Group | Score | Vector | 
|---|---|---|
| Base | ||
| Temporal | ||
| Environmental | 
References
Acknowledgements
The Red Hat Security Team has recognized Dave Airlie of the Samba team for reporting this vulnerability.
This document was written by Jason A Rafail.
Other Information
| CVE IDs: | CVE-2003-0686 | 
| Severity Metric: | 8.44 | 
| Date Public: | 2003-08-26 | 
| Date First Published: | 2003-08-29 | 
| Date Last Updated: | 2003-08-29 18:10 UTC | 
| Document Revision: | 9 |