Computer Security
[EN] securityvulns.ru no-pyccku


Samba buffer overflow
updated since 12.12.2007
Published:16.12.2007
Source:
SecurityVulns ID:8440
Type:remote
Threat Level:
8/10
Description:Buffer overflow in send_mailslot() on parsing domain logon request.
Affected:SAMBA : Samba 3.0
CVE:CVE-2007-6015 (Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.)
Original documentdocumentSAMBA, [SECURITY] Buffer overrun in send_mailslot() (12.12.2007)
 documentSECUNIA, Secunia Research: Samba "send_mailslot()" Buffer Overflow Vulnerability (12.12.2007)
Files:POC for samba send_mailslot()

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod