First published: Fri Nov 16 2007(Updated: )
Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | =3.0.0 | |
Samba | =3.0.1 | |
Samba | =3.0.2 | |
Samba | =3.0.2a | |
Samba | =3.0.3 | |
Samba | =3.0.4 | |
Samba | =3.0.4-rc1 | |
Samba | =3.0.5 | |
Samba | =3.0.6 | |
Samba | =3.0.7 | |
Samba | =3.0.8 | |
Samba | =3.0.9 | |
Samba | =3.0.10 | |
Samba | =3.0.11 | |
Samba | =3.0.12 | |
Samba | =3.0.13 | |
Samba | =3.0.14 | |
Samba | =3.0.14a | |
Samba | =3.0.15 | |
Samba | =3.0.16 | |
Samba | =3.0.17 | |
Samba | =3.0.18 | |
Samba | =3.0.19 | |
Samba | =3.0.20 | |
Samba | =3.0.20a | |
Samba | =3.0.20b | |
Samba | =3.0.21 | |
Samba | =3.0.21a | |
Samba | =3.0.21b | |
Samba | =3.0.21c | |
Samba | =3.0.22 | |
Samba | =3.0.23 | |
Samba | =3.0.23a | |
Samba | =3.0.23b | |
Samba | =3.0.23c | |
Samba | =3.0.23d | |
Samba | =3.0.24 | |
Samba | =3.0.25 | |
Samba | =3.0.25-pre1 | |
Samba | =3.0.25-pre2 | |
Samba | =3.0.25-rc1 | |
Samba | =3.0.25-rc2 | |
Samba | =3.0.25-rc3 | |
Samba | =3.0.25a | |
Samba | =3.0.25b | |
Samba | =3.0.25c | |
Samba | =3.0.26 | |
Samba | =3.0.26a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5398 has been assigned a medium severity rating due to its potential to allow remote code execution.
To fix CVE-2007-5398, update your Samba installation to version 3.0.26b or higher.
CVE-2007-5398 affects Samba versions from 3.0.0 through 3.0.26a when configured as a WINS server.
CVE-2007-5398 is classified as a stack-based buffer overflow vulnerability.
Yes, attackers can exploit CVE-2007-5398 remotely through crafted WINS Name Registration requests.