Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Samba 3.0.x < 3.0.7 Multiple DoS

Medium

Synopsis

The remote Samba server is affected by a multiple Denial of Service (DoS) attack vectors.

Description

According to its banner, the version of Samba is 3.0.x earlier than 3.0.7. It is, therefore, affected by multiple vulnerabilities :

- A flaw exists that may allow a remote denial of service. The issue is triggered when an attacker sends specially crafted packets to the smbd daemon during the ASN.1 parsing routine causing many processes to spawn resulting in a loss of availability for the platform. (CVE-2004-0807) - A flaw exists that may allow a remote denial of service. The issue is triggered when an attacker sends a malformed UDP packet and will result in loss of availability for Samba's nmbd daemon. The 'process_logon_packet' function does not properly validate that the packet is appropriately sized to contain the number of structures it claims, when processing a 'SAM_UAS_CHANGE' request. If the packet claims a large number of structures and a smaller number are contained in the packet, nmbd will reference memory outside of the packet, possibly causing the daemon to crash. (CVE-2004-0808)

Solution

Upgrade Samba to version 3.0.7 or later.