{"vuid":"VU#680260","idnumber":"680260","name":"pam_smb module contains remote buffer overflow","keywords":["pam_smb module","remote buffer overflow","Pluggable Authentication Module","PAM","Server Message Block","SMB"],"overview":"The pam_smb module contains a remotely exploitable buffer overflow vulnerability. This module is used to authenticate users using an external Server Message Block (SMB) server. A remote attacker may be able to exploit this vulnerability to run arbitrary commands on the system.","clean_desc":"The pam_smb module versions 1.1.6 and prior contain a remotely exploitable buffer overflow vulnerability in the processing of the password buffer. This module is used when a system is configured to authenticate users using an external Server Message Block (SMB) server.","impact":"An unauthenticated remote attacker may be able to exploit this vulnerability to run arbitrary commands on the system.","resolution":"This problem is reportedly resolved in version 1.1.7 of the pam_smb module. Upgrade, or apply the patches provided by your vendor.","workarounds":"","sysaffected":"","thanks":"The Red Hat Security Team has recognized Dave Airlie of the Samba team  for reporting this vulnerability.","author":"This document was written by Jason A Rafail.","public":["http://www.secunia.com/advisories/9611/","http://us1.samba.org/samba/ftp/pam_smb/","https://rhn.redhat.com/errata/RHSA-2003-261.html"],"cveids":["CVE-2003-0686"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-08-26T14:00:42Z","publicdate":"2003-08-26T00:00:00Z","datefirstpublished":"2003-08-29T18:09:55Z","dateupdated":"2003-08-29T18:10:18Z","revision":9,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"9","cam_attackeraccessrequired":"10","cam_scorecurrent":"8.4375","cam_scorecurrentwidelyknown":"10.125","cam_scorecurrentwidelyknownexploited":"16.875","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":8.4375,"vulnote":null}