Search for vulnerabilities
Vulnerability details: VCID-bvch-rees-b7cu
Vulnerability ID VCID-bvch-rees-b7cu
Aliases CVE-2012-1182
Summary
Status Published
Exploitability 2.0
Weighted Severity 0.7
Risk 1.4
Affected and Fixed Packages Package Details
Weaknesses (2)
Data source Metasploit
Description This module triggers a vulnerability in the LSA RPC service of the Samba daemon because of an error on the PIDL auto-generated code. Making a specially crafted call to SetInformationPolicy to set a PolicyAuditEventsInformation allows to trigger a heap overflow and finally execute arbitrary code with root privileges. The module uses brute force to guess the stackpivot/rop chain or the system() address and redirect flow there in order to bypass NX. The start and stop addresses for brute forcing have been calculated empirically. On the other hand the module provides the StartBrute and StopBrute which allow the user to configure his own addresses.
Note
Stability:
  - crash-service-restarts
Reliability:
  - unreliable-session
SideEffects:
  - ioc-in-logs
Ransomware campaign use Unknown
Source publication date April 10, 2012
Platform Linux,Unix
Source URL https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/samba/setinfopolicy_heap.rb
Data source Exploit-DB
Date added Oct. 10, 2012
Description Samba 3.4.16/3.5.14/3.6.4 - SetInformationPolicy AuditEventsInfo Heap Overflow (Metasploit)
Ransomware campaign use Known
Source publication date Oct. 10, 2012
Exploit type remote
Platform linux
Source update date Dec. 1, 2016
Source URL http://www.zerodayinitiative.com/advisories/ZDI-12-069/
There are no known vectors.
Exploit Prediction Scoring System (EPSS)
Percentile 0.98879
EPSS Score 0.76396
Published At July 30, 2025, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2025-07-31T08:41:57.050556+00:00 Ubuntu USN Importer Import https://usn.ubuntu.com/1423-1/ 37.0.0