Secunia reported a buffer overflow flaw in Samba's reply_netbios_packet() function.
According to Secunia:
This can be exploited to cause a stack-based buffer
overflow by sending multiple specially crafted WINS "Name Registration"
requests followed by a WINS "Name Query" request.
Acknowledgements:
Red Hat would like to thank Alin Rad Pop of Secunia Research for responsibly disclosing this issue.
Secunia reported a buffer overflow flaw in Samba's reply_netbios_packet() function. According to Secunia: This can be exploited to cause a stack-based buffer overflow by sending multiple specially crafted WINS "Name Registration" requests followed by a WINS "Name Query" request. Acknowledgements: Red Hat would like to thank Alin Rad Pop of Secunia Research for responsibly disclosing this issue.