Lucene search

K
sambaSamba SecuritySAMBA:CVE-2007-4572
HistoryNov 15, 2007 - 12:00 a.m.

Stack buffer overflow in nmbd's logon

2007-11-1500:00:00
Samba Security
www.samba.org
18

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.059 Low

EPSS

Percentile

93.4%

Description

Samba developers have discovered what is believed to be
a non-exploitable buffer over in nmbd during the processing
of GETDC logon server requests. This code is only used
when the Samba server is configured as a Primary or Backup
Domain Controller.

Patch Availability

A patch addressing this defect has been posted to

http://www.samba.org/samba/security/

Additionally, Samba 3.0.27 has been issued as a security
release to correct the defect.

Workaround

Samba administrators may avoid this security issue by disabling
both the β€œdomain logons” and the β€œdomain master” options in in
the server’s smb.conf file. Note that this will disable all
domain controller features as well.

Credits

This vulnerability was discovered by Samba developers during
an internal code audit.

The time line is as follows:

  • Sep 13, 2007: Initial report to [email protected] including
    proposed patch.
  • Sep 14, 2007: Patch review by members of the Josh Bressers
    (RedHat Security Team) and Simo Sorce (Samba/RedHat developer)
  • Nov 15, 2007: Public security advisory made available.

== Our Code, Our Bugs, Our Responsibility.
== The Samba Team

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.059 Low

EPSS

Percentile

93.4%