CERT-In Vulnerability Note
CIVN-2007-0161
"send_mailslot " Buffer Overflow Vulnerability in Samba
Original Issue Date:December 19, 2007
Severity Rating: HIGH
Systems Affected
Overview
A vulnerability has been reported in Samba which could be exploited by a remote attacker to cause execution of arbitrary code or compromise the affected system.
Description
A vulnerability has been reported in Samba due to a boundary error within the "send_mailslot " function while handling a specially crafted "SAMLOGON" domain logon packet containing a username string placed at an odd offset followed by an overly long GETDC string . This vulnerability could be exploited by remote attackers to execute arbitrary code or compromise an affected system.
Successful exploitation requires that "domain logons" option is enabled in smb.conf.
Solution
Update to version 3.0.28 or apply patch. Patch for Samba 3.0.27a:
http://us3.samba.org/samba/ftp/patches/security/samba-3.0.27a-CVE-2007-6015.patch
Vendor Information
Samba
http://us3.samba.org/samba/security/CVE-2007-6015.html
References
Secunia
http://secunia.com/advisories/27760
FrSirt
http://www.frsirt.com/english/advisories/2007/4153
Securityfocus
http://www.securityfocus.com/archive/1/archive/1/484825/100/0/threaded
CVE Name
CVE-2007-6015
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-2436857
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|