NETBIOS: Mailslot Overflow

This signature detects attempts to exploit a known vulnerability in the Samba. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

Samba is prone to a remote stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. NOTE: This issue occurs only when the 'domain logons' option is enabled. An attacker can exploit this issue to execute arbitrary code with superuser privileges. Successful attacks will completely compromise affected computers. Failed exploit attempts will result in a denial of service.

Affected Products

Ubuntu ubuntu_linux

Short Name
NETBIOS:OVERFLOW:MAILSLOT
Severity
Major
Recommended
False
Recommended Action
Drop
Category
NETBIOS
Keywords
CVE-2007-6015 Mailslot Overflow bid:26791
Release Date
12/21/2007
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3729
False Positive
Unknown
Vendors

Red_hat

Samba

Suse

Apple

Gentoo

Hp

Sun

Rpath

Avaya

Slackware

Ubuntu

Mandriva

Debian

Vmware

CVSS Score

9.3

Found a potential security threat?