Samba nmbd Buffer Overflow in reply_netbios_packet() Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID: 1018953|
SecurityTracker URL: http://securitytracker.com/id/1018953
(Links to External Site)
Date: Nov 15 2007
Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 3.0.0 - 3.0.26a|
A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system.|
A remote user can send a series of name registration requests followed by a specially crafted name query request to trigger a buffer overflow in the reply_netbios_packet() function in nmbd and execute arbitrary code on the target system. The code will run with the privileges of the target service.
The system is affected when the WINS server daemon (nmbd) is configured.
The vendor was notified on October 30, 2007.
Alin Rad Pop of Secunia Research reported this vulnerability.
A remote user can execute arbitrary code on the target system.|
The vendor has issued a fixed version (3.0.27).|
Also, patches are available at:
The Samba advisory is available at:
Vendor URL: samba.org/samba/security/CVE-2007-5398.html (Links to External Site)
|Underlying OS: Linux (Any), UNIX (Any)|
This archive entry has one or more follow-up message(s) listed below.|
Source Message Contents
Subject: [SAMBA] CVE-2007-5398 - Remote Code Execution in Samba's nmbd|
-----BEGIN PGP SIGNED MESSAGE-----
== Subject: Remote code execution in Samba's WINS
== server daemon (nmbd) when processing name
== registration followed name query requests.
== CVE ID#: CVE-2007-5398
== Versions: Samba 3.0.0 - 3.0.26a (inclusive)
== Summary: When nmbd has been configured as a WINS
== server, a client can send a series of name
== registration request followed by a specific
== name query request packet and execute
== arbitrary code.
Secunia Research reported a vulnerability that allows for
the execution of arbitrary code in nmbd. This defect may
only be exploited when the "wins support" parameter has
been enabled in smb.conf.
A patch addressing this defect has been posted to
Additionally, Samba 3.0.27 has been issued as a security
release to correct the defect.
Samba administrators may avoid this security issue by
disabling the "wins support" feature in the hosts smb.conf
This vulnerability was reported to Samba developers by
Alin Rad Pop, Secunia Research.
The time line is as follows:
* Oct 30, 2007: Initial report to email@example.com.
* Oct 30, 2007: First response from Samba developers confirming
the bug along with a proposed patch.
* Nov 15, 2007: Public security advisory to be made available.
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
-----END PGP SIGNATURE-----