SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (File Transfer/Sharing)  >   Samba Vendors:   Samba.org
Samba nmbd Buffer Overflow in reply_netbios_packet() Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1018953
SecurityTracker URL:  http://securitytracker.com/id/1018953
CVE Reference:   CVE-2007-5398   (Links to External Site)
Date:  Nov 15 2007
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 3.0.0 - 3.0.26a
Description:   A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system.

A remote user can send a series of name registration requests followed by a specially crafted name query request to trigger a buffer overflow in the reply_netbios_packet() function in nmbd and execute arbitrary code on the target system. The code will run with the privileges of the target service.

The system is affected when the WINS server daemon (nmbd) is configured.

The vendor was notified on October 30, 2007.

Alin Rad Pop of Secunia Research reported this vulnerability.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fixed version (3.0.27).

Also, patches are available at:

http://www.samba.org/samba/security/

The Samba advisory is available at:

http://samba.org/samba/security/CVE-2007-5398.html

Vendor URL:  samba.org/samba/security/CVE-2007-5398.html (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 15 2007 (Red Hat Issues Fix) Samba nmbd Buffer Overflow in reply_netbios_packet() Lets Remote Users Execute Arbitrary Code
Red Hat has released a fix for Red Hat Enterprise Linux 4.
Nov 16 2007 (Red Hat Issues Fix) Samba nmbd Buffer Overflow in reply_netbios_packet() Lets Remote Users Execute Arbitrary Code
Red Hat has released a fix for Red Hat Enterprise Linux 5.
Nov 16 2007 (Red Hat Issues Fix) Samba nmbd Buffer Overflow in reply_netbios_packet() Lets Remote Users Execute Arbitrary Code
Red Hat has released a fix for Red Hat Enterprise Linux 2.1 and 3.
Mar 11 2008 (HP Issues Fix) Samba nmbd Buffer Overflow in reply_netbios_packet() Lets Remote Users Execute Arbitrary Code
HP has released a fix for HP CIFS Server on HP-UX.
Jun 2 2008 (Sun Issues Fix) Samba nmbd Buffer Overflow in reply_netbios_packet() Lets Remote Users Execute Arbitrary Code
Sun has issued a fix for Solaris 10.
Jun 23 2008 (HP Issues Fix for HP-UX) Samba nmbd Buffer Overflow in reply_netbios_packet() Lets Remote Users Execute Arbitrary Code
HP has issued a fix for HP-UX 11.11, 11.23, and 11.31.



 Source Message Contents

Subject:  [SAMBA] CVE-2007-5398 - Remote Code Execution in Samba's nmbd

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

==========================================================
==
== Subject:     Remote code execution in Samba's WINS
==              server daemon (nmbd) when processing name
==              registration followed name query requests.
==
== CVE ID#:     CVE-2007-5398
==
== Versions:    Samba 3.0.0 - 3.0.26a (inclusive)
==
== Summary:     When nmbd has been configured as a WINS
==              server, a client can send a series of name
==              registration request followed by a specific
==              name query request packet and execute
==              arbitrary code.
==
==========================================================

===========
Description
===========

Secunia Research reported a vulnerability that allows for
the execution of arbitrary code in nmbd.  This defect may
only be exploited when the "wins support" parameter has
been enabled in smb.conf.


==================
Patch Availability
==================

A patch addressing this defect has been posted to

  http://www.samba.org/samba/security/

Additionally, Samba 3.0.27 has been issued as a security
release to correct the defect.


==========
Workaround
==========

Samba administrators may avoid this security issue by
disabling the "wins support" feature in the hosts smb.conf
file.


=======
Credits
=======

This vulnerability was reported to Samba developers by
Alin Rad Pop, Secunia Research.

The time line is as follows:

* Oct 30, 2007: Initial report to security@samba.org.
* Oct 30, 2007: First response from Samba developers confirming
  the bug along with a proposed patch.
* Nov 15, 2007: Public security advisory to be made available.


==========================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
==========================================================
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFHPEe6IR7qMdg1EfYRAqoAAJsHFk1kScYHweqRny4PP4ngQaFo7QCdElle
Cv+e7K/AE69rXcmeU67jHzQ=
=9Wap
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC