SynopsisThe remote version of Samba is outdated and thus affected by several vulnerabilities.
DescriptionVersions of Samba older than 4.0.18 or 4.1.8 are unpatched for the following vulnerabilities:
- An error in the 'dns_process_send()' function in the internal DNS server can cause an infinite loop that results in denial of service, due to the server not checking the 'reply' flag in a DNS packet header when processing a request. (CVE-2014-0239)
- A flaw in the 'vfswrap_fsctl()' function that is triggered when responding to authenticated FSCTL_GET_SHADOW_COPY_DATA or FSCTL_SRV_ENUMERATE_SNAPSHOTS client requests can result in the exposure of eight bytes of uninitialized memory. This affects versions of Samba 3.6.6 and onward. (CVE-2014-0178)
SolutionInstall the patch referenced in the project's advisory, or upgrade to 4.0.18, 4.1.8, or later.