Hide Forgot
Secunia reported a buffer overflow flaw in Samba's reply_netbios_packet() function. According to Secunia: This can be exploited to cause a stack-based buffer overflow by sending multiple specially crafted WINS "Name Registration" requests followed by a WINS "Name Query" request. Acknowledgements: Red Hat would like to thank Alin Rad Pop of Secunia Research for responsibly disclosing this issue.
Created attachment 243791 [details] Proposed patch
Now public at http://us1.samba.org/samba/security/CVE-2007-5398.html removing embargo
This issue was addressed in: Red Hat Enterprise Linux: http://rhn.redhat.com/errata/RHSA-2007-1034.html http://rhn.redhat.com/errata/RHSA-2007-1013.html http://rhn.redhat.com/errata/RHSA-2007-1016.html http://rhn.redhat.com/errata/RHSA-2007-1017.html Fedora: updated to fixed upstream version