SMB: Samba WINS Server Name Registration Handling Stack Buffer Overflow

This signature detects attempts to exploit a known vulnerability in the Samba handles WINS messages. A successful attack can lead to arbitrary code execution.

Extended Description

Samba is prone to a remote stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. NOTE: This issue occurs only when Samba is configured with the 'wins support' option enabled in the host's 'smb.conf' file. An attacker can exploit this issue to execute arbitrary code in the context of the affected application. Successful attacks will completely compromise affected computers. Failed exploit attempts will result in a denial of service. Samba 3.0.0 through 3.0.26a are vulnerable.

Affected Products

Samba samba

References

BugTraq: 26455

CVE: CVE-2007-5398

Short Name
SMB:WINS-SNAME-REG
Severity
Critical
Recommended
False
Recommended Action
Drop
Category
SMB
Keywords
Buffer CVE-2007-5398 Handling Name Overflow Registration Samba Server Stack WINS bid:26455
Release Date
10/19/2010
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3716
False Positive
Unknown
Vendors

Red_hat

Samba

Suse

Apple

Gentoo

Hp

Sun

Rpath

Avaya

Slackware

Ubuntu

Mandriva

Debian

Vmware

CVSS Score

9.3

Found a potential security threat?