Lucene search

K
sambaSamba SecuritySAMBA:CVE-2007-6015
HistoryDec 10, 2007 - 12:00 a.m.

Boundary failure in GETDC mailslot

2007-12-1000:00:00
Samba Security
www.samba.org
60

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%

Description

Secunia Research reported a vulnerability that allows for
the execution of arbitrary code in nmbd. This defect is
only be exploited when the “domain logons” parameter has
been enabled in smb.conf.

Patch Availability

A patch addressing this defect has been posted to

http://www.samba.org/samba/security/

Additionally, Samba 3.0.28 has been issued as a security
release to correct the defect.

Workaround

Samba administrators may avoid this security issue by disabling
both the “domain logons” options in the server’s smb.conf file.
Note that this will disable all domain controller features as
well.

Credits

This vulnerability was reported to Samba developers by
Alin Rad Pop, Secunia Research.

The time line is as follows:

  • Nov 22, 2007: Initial report to [email protected].
  • Nov 22, 2007: First response from Samba developers confirming
    the bug along with a proposed patch.
  • Dec 10, 2007: Public security advisory made available.

== Our Code, Our Bugs, Our Responsibility.
== The Samba Team

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.973 High

EPSS

Percentile

99.9%