Short Name |
NETBIOS:OVERFLOW:MAILSLOT |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
NETBIOS |
Keywords |
Mailslot Overflow |
Release Date |
2007/12/21 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Samba. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Samba is prone to a remote stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. NOTE: This issue occurs only when the 'domain logons' option is enabled. An attacker can exploit this issue to execute arbitrary code with superuser privileges. Successful attacks will completely compromise affected computers. Failed exploit attempts will result in a denial of service.