CVE-2014-0239

MEDIUM

Description

The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.

References

http://secunia.com/advisories/59579

http://security.gentoo.org/glsa/glsa-201502-15.xml

http://www.samba.org/samba/security/CVE-2014-0239

http://www.securityfocus.com/bid/67691

http://www.securitytracker.com/id/1030309

Details

Source: MITRE

Published: 2014-05-28

Updated: 2017-01-07

Type: CWE-20

Risk Information

CVSS v2.0

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
81536GLSA-201502-15 : Samba: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
76341openSUSE Security Update : samba (openSUSE-SU-2014:0859-1)NessusSuSE Local Security Checks
medium
76275Ubuntu 10.04 LTS / 12.04 LTS / 13.10 / 14.04 LTS : samba vulnerabilities (USN-2257-1)NessusUbuntu Local Security Checks
medium
76207Slackware 14.0 / 14.1 / current : samba (SSA:2014-175-04)NessusSlackware Local Security Checks
medium
3540Samba 4.0.x < 4.0.18 / 4.1.x < 4.1.8 Multiple VulnerabilitiesNessus Network MonitorSamba
medium
74290Samba 3.5.x / 3.6.x < 3.6.25 / 4.1.x < 4.1.8 Multiple VulnerabilitiesNessusMisc.
low
74242Samba 4.x < 4.0.18 Multiple VulnerabilitiesNessusMisc.
low