exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

samba30x.txt

samba30x.txt
Posted Sep 13, 2004
Site idefense.com

Samba 3.0.x is susceptible to multiple denial of services bugs that can remotely crash the daemons nmbd and smbd.

tags | advisory, denial of service
advisories | CVE-2004-0807, CVE-2004-0808
SHA-256 | f4537d8e10bef6278b460a495b011aa96a2114153cc957d69798d3055570f110

samba30x.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Subject: Samba 3.0.x Denial of Service Flaw

Summary: (i) A DoS bug in smbd may allow an
unauthenticated user to cause smbd to
spawn new processes each one entering
an infinite loop. After sending a sufficient
amount of packets it is possible to exhaust
the memory resources on the server.

(ii) A DoS bug in nmbd may allow an attacker
to remotely crash the nmbd daemon.

Affected
Versions: Defect (i) affects Samba 3.0.x prior to and
including v3.0.6.

Defect (ii) affects Samba 3.0.x prior to
and including v3.0.6.

Patch
Availability: The patch file for Samba 3.0.5 addressing both
bugs (samba-3.0.5-DoS.patch) can be downloaded
from
https://download.samba.org/samba/ftp/patches/security/


Description
- -----------

CAN-2004-0807: A defect in smbd's ASN.1 parsing allows an
attacker to send a specially crafted packet during the
authentication request which will send the newly spawned
smbd process into an infinite loop. Given enough of these
packets, it is possible to exhaust the available memory
on the server.

CAN-2004-0808: A defect in nmbd's process of mailslot packets
can allow an attacker to anonymously crash nmbd.


Protecting Unpatched Servers
- ----------------------------

The Samba Team always encourages users to run the latest stable
release as a defense of against attacks. However, under certain
circumstances it may not be possible to immediately upgrade
important installations. In such cases, administrators should
read the "Server Security" documentation found at
https://www.samba.org/samba/docs/server_security.html.


Credits
- --------

Both security issues were reported to Samba developers by
iDEFENSE (https://www.idefense.com/). The defect discovery
was anonymously reported to iDEFENSE via their Vulnerability
Contributor Program (https://www.idefense.com/poi/teams/vcp.jsp).


- --
Our Code, Our Bugs, Our Responsibility.


-- The Samba Team


-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - https://enigmail.mozdev.org

iD8DBQFBRYrsIR7qMdg1EfYRAs0vAKDWgtClvlXUp0K8vcXCpBX4Rxs8/QCeLn42
a36LLoki3iL2l5veoMUAXso=
=LT1R
-----END PGP SIGNATURE-----
Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    17 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close