Description
Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1427-1 | New samba packages fix arbitrary code execution |
Ubuntu USN |
USN-556-1 | Samba vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: flexera
Published:
Updated: 2024-08-07T15:54:25.651Z
Reserved: 2007-11-19T00:00:00.000Z
Link: CVE-2007-6015
No data.
Status : Modified
Published: 2007-12-13T21:46:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-6015
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN