Your Ad Here

15 September 2009

Samba nmbd Mailslot Packet Denial of Service Vulnerability

Description:

Certain versions of Samba contain a flawed implementation of the process_logon_packet function in the nmbd daemon. As a result, an unauthenticated attacker can craft a corrupt SAM_UAS_CHANGE request that causes the nmbd daemon to crash. Note that in order for exploitation to be successful, domain logons must be enabled in the configuration file ("domain logons = yes" in smb.conf).

References:

Solution:

Upgrade to Samba 3.0.7



Information on these pages is summary information extracted from the NeXpose Vulnerabilty Assessment system. Full details are provided within the NeXpose product for licensed users.

0 comments: