SynopsisThe remote Samba server is affected by a multiple Denial of Service (DoS) attack vectors.
DescriptionAccording to its banner, the version of Samba is 3.0.x earlier than 3.0.7. It is, therefore, affected by multiple vulnerabilities :
- A flaw exists that may allow a remote denial of service. The issue is triggered when an attacker sends specially crafted packets to the smbd daemon during the ASN.1 parsing routine causing many processes to spawn resulting in a loss of availability for the platform. (CVE-2004-0807)
- A flaw exists that may allow a remote denial of service. The issue is triggered when an attacker sends a malformed UDP packet and will result in loss of availability for Samba's nmbd daemon. The 'process_logon_packet' function does not properly validate that the packet is appropriately sized to contain the number of structures it claims, when processing a 'SAM_UAS_CHANGE' request. If the packet claims a large number of structures and a smaller number are contained in the packet, nmbd will reference memory outside of the packet, possibly causing the daemon to crash. (CVE-2004-0808)
SolutionUpgrade Samba to version 3.0.7 or later.