TROYANOSYVIRUS
Volver a CVEs

CVE-2007-4572

N/A

Descripcion

Stack-based buffer overflow in nmbd in Samba 3.0.0 through 3.0.26a, when configured as a Primary or Backup Domain controller, allows remote attackers to have an unknown impact via crafted GETDC mailslot requests, related to handling of GETDC logon server requests.

Detalles CVE

Puntuacion CVSS v3.1N/A
Publicado11/16/2007
Ultima modificacion4/23/2026
Fuentenvd
Avistamientos honeypot0

Productos afectados

samba:samba

Debilidades (CWE)

CWE-119

Referencias

https://usn.ubuntu.com/544-1/(secalert@redhat.com)
http://docs.info.apple.com/article.html?artnum=307179(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=120524782005154&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27450(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27679(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27682(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27691(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27701(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27720(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27731(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27787(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27927(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28136(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28368(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29341(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30484(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30736(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30835(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1018954(af854a3a-2127-422b-91ae-364da2661108)
http://us1.samba.org/samba/security/CVE-2007-4572.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2007/dsa-1409(af854a3a-2127-422b-91ae-364da2661108)
http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-1013.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-1016.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-1017.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/26454(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-544-2(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-617-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA07-352A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/3869(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2007/4238(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/0064(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/1908(af854a3a-2127-422b-91ae-364da2661108)
https://issues.rpath.com/browse/RPL-1894(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/544-1/(af854a3a-2127-422b-91ae-364da2661108)

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.