Gerald (Jerry) Carter
2004-Sep-13 11:52 UTC
Samba 3.0 DoS Vulberabilities (CAN-2004-0807 & CAN-2004-0808)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Subject: Samba 3.0.x Denial of Service Flaw Summary: (i) A DoS bug in smbd may allow an unauthenticated user to cause smbd to spawn new processes each one entering an infinite loop. After sending a sufficient amount of packets it is possible to exhaust the memory resources on the server. (ii) A DoS bug in nmbd may allow an attacker to remotely crash the nmbd daemon. Affected Versions: Defect (i) affects Samba 3.0.x prior to and including v3.0.6. Defect (ii) affects Samba 3.0.x prior to and including v3.0.6. Patch Availability: The patch file for Samba 3.0.5 addressing both bugs (samba-3.0.5-DoS.patch) can be downloaded from http://download.samba.org/samba/ftp/patches/security/ Description - ----------- CAN-2004-0807: A defect in smbd's ASN.1 parsing allows an attacker to send a specially crafted packet during the authentication request which will send the newly spawned smbd process into an infinite loop. Given enough of these packets, it is possible to exhaust the available memory on the server. CAN-2004-0808: A defect in nmbd's process of mailslot packets can allow an attacker to anonymously crash nmbd. Protecting Unpatched Servers - ---------------------------- The Samba Team always encourages users to run the latest stable release as a defense of against attacks. However, under certain circumstances it may not be possible to immediately upgrade important installations. In such cases, administrators should read the "Server Security" documentation found at http://www.samba.org/samba/docs/server_security.html. Credits - -------- Both security issues were reported to Samba developers by iDEFENSE (http://www.idefense.com/). The defect discovery was anonymously reported to iDEFENSE via their Vulnerability Contributor Program (http://www.idefense.com/poi/teams/vcp.jsp). - -- Our Code, Our Bugs, Our Responsibility. -- The Samba Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iD8DBQFBRYsiIR7qMdg1EfYRAmXAAJ9UnPP3e45uR6Cuy2NTaqlzYaT+cgCeM9qw TAgfNCbYBnuxHcHdKfBsJkk=4VkY -----END PGP SIGNATURE-----
Maybe Matching Threads
- Samba 3.0 DoS Vulberabilities (CAN-2004-0807 & CAN-2004-0808)
- CAN-2004-1154 : Integer overflow could lead to remote code execution in Samba 2.x, 3.0.x <= 3.0.9
- ERRATA: Potential Arbitrary File Access (CAN-2004-0815)
- [SECURITY] CAN-2004-0930: Potential Remote Denial of Service Vulnerability in Samba 3.0.x <= 3.0.7
- CAN-2004-1154 : Integer overflow could lead to remote code execution in Samba 2.x, 3.0.x <= 3.0.9