From 4f2d7949f03e1c198bc888f2d05f421d35c57e21 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Mon, 9 Oct 2017 18:53:29 +0100 Subject: reinit the tree, so we can have metadata --- metadata/glsa/glsa-200409-16.xml | 69 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 69 insertions(+) create mode 100644 metadata/glsa/glsa-200409-16.xml (limited to 'metadata/glsa/glsa-200409-16.xml') diff --git a/metadata/glsa/glsa-200409-16.xml b/metadata/glsa/glsa-200409-16.xml new file mode 100644 index 000000000000..420837d7c779 --- /dev/null +++ b/metadata/glsa/glsa-200409-16.xml @@ -0,0 +1,69 @@ + + + + Samba: Denial of Service vulnerabilities + + Two Denial of Service vulnerabilities have been found and fixed in Samba. + + Samba + 2004-09-13 + 2004-09-13: 01 + remote + + + 3.0.7 + 3.0 + 3.0.7 + + + +

+ Samba is a freely available SMB/CIFS implementation which allows seamless + interoperability of file and print services to other SMB/CIFS clients. smbd + and nmbd are two daemons used by the Samba server. +

+
+ +

+ There is a defect in smbd's ASN.1 parsing. A bad packet received during the + authentication request could throw newly-spawned smbd processes into an + infinite loop (CAN-2004-0807). Another defect was found in nmbd's + processing of mailslot packets, where a bad NetBIOS request could crash the + nmbd process (CAN-2004-0808). +

+
+ +

+ A remote attacker could send specially crafted packets to trigger both + defects. The ASN.1 parsing issue can be exploited to exhaust all available + memory on the Samba host, potentially denying all service to that server. + The nmbd issue can be exploited to crash the nmbd process, resulting in a + Denial of Service condition on the Samba server. +

+
+ +

+ There is no known workaround at this time. +

+
+ +

+ All Samba 3.x users should upgrade to the latest version: +

+ + # emerge sync + + # emerge -pv ">=net-fs/samba-3.0.7" + # emerge ">=net-fs/samba-3.0.7" +
+ + CAN-2004-0807 + CAN-2004-0808 + + + koon + + + jaervosz + +
-- cgit v1.2.3