SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (File Transfer/Sharing)  >   Samba Vendors:   Samba.org
(Sun Issues Fix) Samba nmbd Buffer Overflow in Processing GETDC mailslot Requests Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1020154
SecurityTracker URL:  http://securitytracker.com/id/1020154
CVE Reference:   CVE-2007-4572   (Links to External Site)
Date:  Jun 2 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.0.0 - 3.0.26a
Description:   A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system.

A remote user can send specially crafted GETDC mailslot requests to trigger a buffer overflow in nmbd and execute arbitrary code on the target system. The code will run with the privileges of the target service.

The vendor discovered this vulnerability on September 13, 2007.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   Sun has issued the following fix.

SPARC Platform

* Solaris 10 with patch 119757-10 or later

x86 Platform

* Solaris 10 with patch 119758-10 or later

Sun is working on a fix for Solaris 9.

The Sun advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-237764-1

Cause:   Boundary error
Underlying OS:  UNIX (Solaris - SunOS)
Underlying OS Comments:  9, 10

Message History:   This archive entry is a follow-up to the message listed below.
Nov 15 2007 Samba nmbd Buffer Overflow in Processing GETDC mailslot Requests Lets Remote Users Execute Arbitrary Code



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC