Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1409-1 | New samba packages fix several vulnerabilities |
Debian DSA |
DSA-1409-2 | New samba packages fix several vulnerabilities |
Debian DSA |
DSA-1409-3 | New samba packages fix several vulnerabilities |
Ubuntu USN |
USN-544-1 | Samba vulnerabilities |
Ubuntu USN |
USN-544-2 | Samba regression |
Ubuntu USN |
USN-617-1 | Samba vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T15:01:09.547Z
Reserved: 2007-08-28T00:00:00.000Z
Link: CVE-2007-4572
No data.
Status : Deferred
Published: 2007-11-16T18:46:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-4572
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Ubuntu USN