Debian DSA-1427-1 : samba - buffer overflow

High Nessus Plugin ID 29262


The remote Debian host is missing a security-related update.


Alin Rad Pop discovered that Samba, a LanManager-like file and printer server for Unix, is vulnerable to a buffer overflow in the nmbd code which handles GETDC mailslot requests, which might lead to the execution of arbitrary code.


Upgrade the samba packages.

For the old stable distribution (sarge), this problem has been fixed in version 3.0.14a-3sarge11. Packages for m68k will be provided later.

For the stable distribution (etch), this problem has been fixed in version 3.0.24-6etch9.

See Also

Plugin Details

Severity: High

ID: 29262

File Name: debian_DSA-1427.nasl

Version: 1.15

Type: local

Agent: unix

Published: 2007/12/11

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:samba, cpe:/o:debian:debian_linux:3.1, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 2007/12/10

Reference Information

CVE: CVE-2007-6015

DSA: 1427

CWE: 119