Description
Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
Published: 2007-11-16
Score: 9.3 Critical
EPSS: 40.7% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1409-1 New samba packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1409-2 New samba packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1409-3 New samba packages fix several vulnerabilities
Ubuntu USN Ubuntu USN USN-544-1 Samba vulnerabilities
References
Link Providers
http://docs.info.apple.com/article.html?artnum=307179 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html cve-icon cve-icon
http://lists.vmware.com/pipermail/security-announce/2008/000002.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=120524782005154&w=2 cve-icon cve-icon
http://secunia.com/advisories/27450 cve-icon cve-icon
http://secunia.com/advisories/27679 cve-icon cve-icon
http://secunia.com/advisories/27682 cve-icon cve-icon
http://secunia.com/advisories/27691 cve-icon cve-icon
http://secunia.com/advisories/27701 cve-icon cve-icon
http://secunia.com/advisories/27720 cve-icon cve-icon
http://secunia.com/advisories/27731 cve-icon cve-icon
http://secunia.com/advisories/27742 cve-icon cve-icon
http://secunia.com/advisories/27787 cve-icon cve-icon
http://secunia.com/advisories/27927 cve-icon cve-icon
http://secunia.com/advisories/28136 cve-icon cve-icon
http://secunia.com/advisories/28368 cve-icon cve-icon
http://secunia.com/advisories/29341 cve-icon cve-icon
http://secunia.com/advisories/30484 cve-icon cve-icon
http://secunia.com/advisories/30835 cve-icon cve-icon
http://secunia.com/secunia_research/2007-90/advisory/ cve-icon cve-icon
http://securityreason.com/securityalert/3372 cve-icon cve-icon
http://securitytracker.com/id?1018953 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.447739 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1 cve-icon cve-icon
http://us1.samba.org/samba/security/CVE-2007-5398.html cve-icon cve-icon
http://www.debian.org/security/2007/dsa-1409 cve-icon cve-icon
http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:224 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_65_samba.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1013.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1016.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1017.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/483744/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/485936/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/486859/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/26455 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA07-352A.html cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2008-0001.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/3869 cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/4238 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0064 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0859/references cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/1712/references cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/1908 cve-icon cve-icon
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/38502 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1894 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2007-5398 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10230 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5811 cve-icon cve-icon
https://usn.ubuntu.com/544-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2007-5398 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html cve-icon cve-icon
History

No history.

Subscriptions

Redhat Enterprise Linux Rhel Eus
Samba Samba
cve-icon MITRE

Status: PUBLISHED

Assigner: flexera

Published:

Updated: 2024-08-07T15:31:58.026Z

Reserved: 2007-10-12T00:00:00.000Z

Link: CVE-2007-5398

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2007-11-16T18:46:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2007-5398

cve-icon Redhat

Severity : Critical

Publid Date: 2007-11-15T14:00:00Z

Links: CVE-2007-5398 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses