SGI Information for VU#298233
Samba contains buffer overflow in SMB/CIFS packet fragment reassembly code
- Vendor Information Help Date Notified:
- Statement Date:
- Date Updated: 17 Mar 2003
Unknown. If you are the vendor named above, please contact us to update your status.
SGI acknowledges receiving CERT VU#298233 and is currently investigating. This is being tracked as SGI Bug# 883509. No further information is available at this time.
For the protection of all our customers, SGI does not disclose, discuss or confirm vulnerabilities until a full investigation has occurred and any necessary patch(es) or release streams are available for all vulnerable and supported SGI operating systems. Until SGI has more definitive information to provide, customers are encouraged to assume all security vulnerabilities as exploitable and take appropriate steps according to local site security policies and requirements. As further information becomes available, additional advisories will be issued via the normal SGI security information distribution methods including the wiretap mailing list on http://www.sgi.com/support/security/
The vendor has not provided us with any further information regarding this vulnerability.
The CERT/CC has no additional comments at this time.
If you have feedback, comments, or additional information about this vulnerability, please send us email.