samba
Page content
- Author: voroskoi
- Vulnerable: 3.0.26-1
- Unaffected: 3.0.26-2sayshell1
Some vulnerabilities have been reported in Samba, which can be exploited by malicious people to compromise a vulnerable system.
- A boundary error exists within the “reply_netbios_packet()” function in nmbd/nmbd_packets.c when sending NetBIOS replies. This can be exploited to cause a stack-based buffer overflow by sending multiple specially crafted WINS “Name Registration” requests followed by a WINS “Name Query” request. Successful exploitation allows execution of arbitrary code, but requires that Samba is configured to run as a WINS server (the “wins support” option is enabled).
- A boundary error exists within the processing of GETDC logon requests. This can be exploited to cause a buffer overflow by sending specially crafted GETDC mailslot requests. Successful exploitation of the vulnerability requires that Samba is configured as a Primary or Backup Domain Controller.
- Bug Tracker URL: http://bugs.frugalware.org/task/2589