Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-2063Improper Restriction of Operations within the Bounds of a Memory Buffer in Samba

Severity
7.5HIGHNVD
EPSS
77.5%
top 1.01%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 17
Latest updateFeb 27

Description

Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages3 packages

debiandebian/samba< samba 2:3.4.0~pre1-1 (bookworm)
Debiansamba/samba< 2:3.4.0~pre1-1+3
NVDsamba/samba3.0.03.3.12

Also affects: Debian Linux 5.0, Ubuntu Linux 6.06, 8.04, 9.04

Patches

🔴Vulnerability Details

2
GHSA
GHSA-ghx2-3q8p-8mw6: Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process2022-05-14
OSV
CVE-2010-2063: Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process2010-06-17

💥Exploits & PoCs

2
Exploit-DB
Samba 3.3.12 (Linux x86) - 'chain_reply' Memory Corruption (Metasploit)2010-09-04
Metasploit
Samba chain_reply Memory Corruption (Linux x86)

📋Vendor Advisories

3
Ubuntu
Samba vulnerability2010-06-16
Red Hat
samba: memory corruption vulnerability2010-06-16
Debian
CVE-2010-2063: samba - Buffer overflow in the SMB1 packet chaining implementation in the chain_reply fu...2010

🕵️Threat Intelligence

1
Rapid7
Metasploit Wrap-Up 02/27/20262026-02-27

📄Research Papers

1
arXiv
One Bad Apple Spoils the Barrel: Understanding the Security Risks Introduced by Third-Party Components in IoT Firmware2022-12-29

💬Community

2
Bugzilla
CVE-2010-2192 pmount: symlink attacks via lockfile files2010-06-18
Bugzilla
CVE-2010-2063 samba: memory corruption vulnerability2010-06-07