[samba-jp:19922] [SECURITY] Buffer overrun in send_mailslot()

OPC oota oota @ mail.linux.bs1.fc.nec.co.jp
2007年 12月 11日 (火) 10:03:44 JST

太田@NEC です。

セキュリティ対応で3.0.28 が出るようです。

----- Forwarded message from "Gerald (Jerry) Carter" <jerry @ samba.org> -----

Date: Mon, 10 Dec 2007 07:49:18 -0600
From: "Gerald (Jerry) Carter" <jerry @ samba.org>
To: samba @ samba.org
Subject: [Samba] [SECURITY] Buffer overrun in send_mailslot()

Hash: SHA1

== Subject:     Boundary failure in GETDC mailslot
==              processing can result in a buffer overrun
== CVE ID#:     CVE-2007-6015
== Versions:    Samba 3.0.0 - 3.0.27a (inclusive)
== Summary:     Specifically crafted GETDC mailslot requests
==              can trigger a boundary error in the domain
==              controller GETDC mail slot support which
==              can be remotely exploited to execute arbitrary
==              code.


Secunia Research reported a vulnerability that allows for
the execution of arbitrary code in nmbd.  This defect is
only be exploited when the "domain logons" parameter has
been enabled in smb.conf.

Patch Availability

A patch addressing this defect has been posted to


Additionally, Samba 3.0.28 has been issued as a security
release to correct the defect.


Samba administrators may avoid this security issue by disabling
both the "domain logons" options in the server's smb.conf file.
Note that this will disable all domain controller features as


This vulnerability was reported to Samba developers by
Alin Rad Pop, Secunia Research.

The time line is as follows:

* Nov 22, 2007: Initial report to security @ samba.org.
* Nov 22, 2007: First response from Samba developers confirming
  the bug along with a proposed patch.
* Dec 10, 2007: Public security advisory made available.

== Our Code, Our Bugs, Our Responsibility.
== The Samba Team

太田 俊哉@NEC OSS開本 OSS推進センター OSS/LinuxソリューションG(芝.港.東京) 
(samba-jp/ldap-jp Staff,mutt-j admin,analog-jp/samba-jp postmaster)

samba-jp メーリングリストの案内