Korean
<< Back
VID 23206
Severity 40
Port 139
Protocol TCP
Class Samba
Detailed Description A version of Samba server which is older than 3.0.28 is detected as running on the host. Samba is an Open Source/Free Software package that provides seamless file and print services to SMB/CIFS clients. Samba versions prior to 3.0.28 are vulnerable to stack-based buffer overflow vulnerability, caused by improper bounds checking in 'nmbd' within the 'send_mailslot' function. By sending a specially crafted "SAMLOGON" domain logon packet containing a username string placed at an odd offset followed by an overly long GETDC string, a remote attacker could execute arbitrary code on the system or cause the affected server to crash. Successful exploitation requires that the "domain logons" option is enabled.

* Note: If this check solely relied on the version number of the remote Samba server to assess this vulnerability, then this might be a false positive.

* References:
http://us1.samba.org/samba/security/CVE-2007-6015.html
http://www.securityfocus.com/archive/1/484818/30/0/threaded
http://secunia.com/advisories/27760/

* Platforms Affected:
Samba Project, Samba versions prior to 3.0.28
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of Samba (3.0.28 or later), available from the Samba Web site at http://us1.samba.org/samba/

As a workaround, disable both the "domain logons" options in the server's smb.conf file. Note that this will disable all domain controller features as well.
Related URL CVE-2007-6015 (CVE)
Related URL 26791 (SecurityFocus)
Related URL (ISS)