RULE(RULE ID:2105159)

Rule General Information
Release Date: 2017-08-04
Rule Name: Samba NDR Parsing Ndr_pull_dnsp_name Integer Overflow Vulnerability (CVE-2016-2123)
Severity:
CVE ID:
Rule Protection Details
Description: An integer overflow vulnerability was found in Samba. The vulnerability is caused by incorrectly parsing crafted NDR data in the ndr_pull_dnsp_name() function, leading to an integer overflow that results in a heap buffer overflow.
Impact: An attacker can exploit the affected software with an integer overflow vulnerability. Successful exploit leads to execute arbitrary code, and failed exploit may disturb the software logic and cause denial of service.
Affected OS: Windows
Reference: SecurityTrackerID:1037493
SecurityFocusBID:94970
https://www.samba.org/samba/security/CVE-2016-2123.html
https://bugzilla.redhat.com/show_bug.cgi
Solutions
More advisories have been published on the website, please visit for more suggestions:
https://www.samba.org/samba/security/CVE-2016-2123.html