CVE-2007-5398Improper Restriction of Operations within the Bounds of a Memory Buffer in Samba

Severity
9.3CRITICALNVD
EPSS
40.7%
top 2.62%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 16
Latest updateMay 1

Description

Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages3 packages

debiandebian/samba< samba 3.0.27-1 (bookworm)
Debiansamba/samba< 3.0.27-1+3
NVDsamba/samba42 versions+41

🔴Vulnerability Details

2
GHSA
GHSA-2488-7mjj-wx6f: Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets2022-05-01
OSV
CVE-2007-5398: Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets2007-11-16

📋Vendor Advisories

5
VMware
Updated service console patches.2008-01-07
Ubuntu
Samba vulnerabilities2007-11-16
Ubuntu
Samba regression2007-11-16
Red Hat
Samba "reply_netbios_packet()" Buffer Overflow Vulnerability2007-11-15
Debian
CVE-2007-5398: samba - Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_pa...2007

💬Community

1
Bugzilla
CVE-2007-5398 Samba "reply_netbios_packet()" Buffer Overflow Vulnerability2007-10-30