Description
Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
Published: 2007-12-13
Score: 9.3 Critical
EPSS: 48.9% Moderate
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-1427-1 New samba packages fix arbitrary code execution
Ubuntu USN Ubuntu USN USN-556-1 Samba vulnerability
References
Link Providers
http://bugs.gentoo.org/show_bug.cgi?id=200773 cve-icon cve-icon
http://docs.info.apple.com/article.html?artnum=307430 cve-icon cve-icon
http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html cve-icon cve-icon
http://lists.vmware.com/pipermail/security-announce/2008/000005.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=120524782005154&w=2 cve-icon cve-icon
http://secunia.com/advisories/27760 cve-icon cve-icon
http://secunia.com/advisories/27894 cve-icon cve-icon
http://secunia.com/advisories/27977 cve-icon cve-icon
http://secunia.com/advisories/27993 cve-icon cve-icon
http://secunia.com/advisories/27999 cve-icon cve-icon
http://secunia.com/advisories/28003 cve-icon cve-icon
http://secunia.com/advisories/28028 cve-icon cve-icon
http://secunia.com/advisories/28029 cve-icon cve-icon
http://secunia.com/advisories/28037 cve-icon cve-icon
http://secunia.com/advisories/28067 cve-icon cve-icon
http://secunia.com/advisories/28089 cve-icon cve-icon
http://secunia.com/advisories/28891 cve-icon cve-icon
http://secunia.com/advisories/29032 cve-icon cve-icon
http://secunia.com/advisories/29341 cve-icon cve-icon
http://secunia.com/advisories/30484 cve-icon cve-icon
http://secunia.com/advisories/30835 cve-icon cve-icon
http://secunia.com/secunia_research/2007-99/advisory/ cve-icon cve-icon
http://security.gentoo.org/glsa/glsa-200712-10.xml cve-icon cve-icon
http://securityreason.com/securityalert/3438 cve-icon cve-icon
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.451554 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm cve-icon cve-icon
http://www.debian.org/security/2007/dsa-1427 cve-icon cve-icon
http://www.kb.cert.org/vuls/id/438395 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:244 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_68_samba.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1114.html cve-icon cve-icon
http://www.redhat.com/support/errata/RHSA-2007-1117.html cve-icon cve-icon
http://www.samba.org/samba/security/CVE-2007-6015.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/484818/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/484825/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/484827/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/485144/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/488457/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/26791 cve-icon cve-icon
http://www.securitytracker.com/id?1019065 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-556-1 cve-icon cve-icon
http://www.us-cert.gov/cas/techalerts/TA08-043B.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2007/4153 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0495/references cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0637 cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/0859/references cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/1712/references cve-icon cve-icon
http://www.vupen.com/english/advisories/2008/1908 cve-icon cve-icon
http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/38965 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-1976 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2007-6015 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2007-6015 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html cve-icon cve-icon
History

No history.

Subscriptions

Redhat Enterprise Linux Rhel Eus
Samba Samba
cve-icon MITRE

Status: PUBLISHED

Assigner: flexera

Published:

Updated: 2024-08-07T15:54:25.651Z

Reserved: 2007-11-19T00:00:00.000Z

Link: CVE-2007-6015

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2007-12-13T21:46:00.000

Modified: 2026-04-23T00:35:47.467

Link: CVE-2007-6015

cve-icon Redhat

Severity : Critical

Publid Date: 2007-12-10T15:00:00Z

Links: CVE-2007-6015 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses