Package: samba Version: 3.0.24-6etch4 Severity: grave Tags: security patch Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for samba.
CVE-2007-5398: | Secunia Research has discovered a vulnerability in Samba, which can be | exploited by malicious people to compromise a vulnerable system. | | The vulnerability is caused due to a boundary error within the | "reply_netbios_packet()" function in nmbd/nmbd_packets.c when sending | NetBIOS replies. This can be exploited to cause a stack-based buffer | overflow by sending multiple specially crafted WINS "Name Registration" | requests followed by a WINS "Name Query" request. | | Successful exploitation allows execution of arbitrary code, but | requires that Samba is configured to run as a WINS server (the "wins | support" option is enabled). This information is from: http://secunia.com/secunia_research/2007-90/advisory/ Mitre did not yet published it but it will be available later on [0]. Please also see: http://us1.samba.org/samba/security/CVE-2007-4572.html and http://us1.samba.org/samba/ftp/patches/security/samba-3.0.26a-CVE-2007-5398.patch for the patch. If you fix this vulnerability please also include the CVE id in your changelog entry. For further information: [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5398 Kind regards Nico -- Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF For security reasons, all text in this mail is double-rot13 encrypted.
pgpfRajMsAICe.pgp
Description: PGP signature