This script is Copyright (C) 2008-2014 Tenable Network Security, Inc.
The remote Samba server may be affected by a buffer overflow
According to its banner, the version of the Samba server on the remote
host is reportedly affected by a boundary error in 'nmbd' within the
'receive_smb_raw' function in 'lib/util_sock.c' when parsing SMB
packets received in a client context. By sending specially crafted
packets to an 'nmbd' server configured as a local or domain master
browser, an attacker can leverage this issue to produce a heap-based
buffer overflow and execute arbitrary code with system privileges.
Note that Nessus has not actually tried to exploit this issue, verify
the remote 'nmbd' server's configuration, or determine if the fix has
See also :
Upgrade to Samba version 3.0.30 or later or apply the patch referenced
in the project's advisory.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 5.9
Public Exploit Available : true
Nessus Plugin ID: 32476 ()
Bugtraq ID: 29404
CVE ID: CVE-2008-1105
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.