Samba < 3.0.28 send_mailslot Function Remote Buffer Overflow

high Nessus Plugin ID 29253

Synopsis

The remote Samba server may be affected by a buffer overflow vulnerability.

Description

According to its banner, the version of the Samba server on the remote host is reportedly affected by a boundary error in 'nmbd' within the 'send_mailslot' function. Provided the 'domain logons' option is enabled in 'smb.conf', an attacker can leverage this issue to produce a stack-based buffer overflow using a 'SAMLOGON' domain logon packet in which the username string is placed at an odd offset and is followed by a long 'GETDC' string.

Note that Nessus has not actually tried to exploit this issue nor verify whether the 'domain logons' option has been enabled on the remote host.

Solution

Upgrade to Samba version 3.0.28 or later.

See Also

https://secuniaresearch.flexerasoftware.com/secunia_research/2007-99/advisory/

https://www.securityfocus.com/archive/1/484818/30/0/threaded

https://www.samba.org/samba/security/CVE-2007-6015.html

Plugin Details

Severity: High

ID: 29253

File Name: samba_3_0_28.nasl

Version: 1.16

Type: remote

Family: Misc.

Published: 12/10/2007

Updated: 11/15/2018

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 9.3

Temporal Score: 7.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:samba:samba

Required KB Items: Settings/ParanoidReport, SMB/NativeLanManager

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2007-6015

BID: 26791

CWE: 119