SMB: Samba WINS Server Name Registration Handling Stack Buffer Overflow
This signature detects attempts to exploit a known vulnerability in the Samba handles WINS messages. A successful attack can lead to arbitrary code execution.
Extended Description
Samba is prone to a remote stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. NOTE: This issue occurs only when Samba is configured with the 'wins support' option enabled in the host's 'smb.conf' file. An attacker can exploit this issue to execute arbitrary code in the context of the affected application. Successful attacks will completely compromise affected computers. Failed exploit attempts will result in a denial of service. Samba 3.0.0 through 3.0.26a are vulnerable.
Affected Products
Samba samba
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Samba
Suse
Apple
Gentoo
Hp
Sun
Rpath
Avaya
Slackware
Ubuntu
Mandriva
Debian
Vmware
9.3