Short Name |
SMB:WINS-SNAME-REG |
---|---|
Severity |
Critical |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMB |
Keywords |
Samba WINS Server Name Registration Handling Stack Buffer Overflow |
Release Date |
2010/10/19 |
Update Number |
1794 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Samba handles WINS messages. A successful attack can lead to arbitrary code execution.
Samba is prone to a remote stack-based buffer-overflow vulnerability because it fails to properly bounds-check user-supplied data before copying it to an insufficiently sized memory buffer. NOTE: This issue occurs only when Samba is configured with the 'wins support' option enabled in the host's 'smb.conf' file. An attacker can exploit this issue to execute arbitrary code in the context of the affected application. Successful attacks will completely compromise affected computers. Failed exploit attempts will result in a denial of service. Samba 3.0.0 through 3.0.26a are vulnerable.