This script is Copyright (C) 2007-2014 Tenable Network Security, Inc.
The remote Samba server may be affected by a buffer overflow
According to its banner, the version of the Samba server on the remote
host is reportedly affected by a boundary error in 'nmbd' within the
'send_mailslot' function. Provided the 'domain logons' option is
enabled in 'smb.conf', an attacker can leverage this issue to produce
a stack-based buffer overflow using a 'SAMLOGON' domain logon packet
in which the username string is placed at an odd offset and is
followed by a long 'GETDC' string.
Note that Nessus has not actually tried to exploit this issue nor
verify whether the 'domain logons' option has been enabled on the
See also :
Upgrade to Samba version 3.0.28 or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true
Nessus Plugin ID: 29253 ()
Bugtraq ID: 26791
CVE ID: CVE-2007-6015
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.