Samba < 3.0.27 Multiple Vulnerabilities

High Nessus Plugin ID 28228


The remote Samba server may be affected one or more vulnerabilities.


According to its banner, the version of the Samba server on the remote host contains a boundary error in the 'reply_netbios_packet()' function in 'nmbd/nmbd_packets.c' when sending NetBIOS replies.
Provided the server is configured to run as a WINS server, a remote attacker can exploit this issue by sending multiple specially crafted WINS 'Name Registration' requests followed by a WINS 'Name Query' request, leading to a stack-based buffer overflow. This could also allow for the execution of arbitrary code.

There is also a stack buffer overflow in nmbd's logon request processing code that can be triggered by means of specially crafted GETDC mailslot requests when the affected server is configured as a Primary or Backup Domain Controller. Note that the Samba security team currently does not believe this particular issue can be exploited to execute arbitrary code remotely.


Upgrade to Samba version 3.0.27 or later.

See Also

Plugin Details

Severity: High

ID: 28228

File Name: samba_3_0_27.nasl

Version: $Revision: 1.14 $

Type: remote

Family: Misc.

Published: 2007/11/16

Modified: 2016/05/13

Dependencies: 10785

Risk Information

Risk Factor: High


Base Score: 9.3

Temporal Score: 8.1

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:samba:samba

Required KB Items: Settings/ParanoidReport, SMB/NativeLanManager

Exploit Available: false

Exploit Ease: No known exploits are available

Reference Information

CVE: CVE-2007-4572, CVE-2007-5398

BID: 26454, 26455

OSVDB: 39179, 39180

CWE: 119