Описание
The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
A denial of service flaw was found in the way the sys_recvfile() function of nmbd, the NetBIOS message block daemon, processed non-blocking sockets. An attacker could send a specially crafted packet that, when processed, would cause nmbd to enter an infinite loop and consume an excessive amount of CPU time.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | samba | Not affected | ||
Red Hat Storage 2.1 | samba | Affected | ||
Red Hat Enterprise Linux 5 | samba3x | Fixed | RHSA-2014:0866 | 09.07.2014 |
Red Hat Enterprise Linux 6 | samba | Fixed | RHSA-2014:0866 | 09.07.2014 |
Red Hat Enterprise Linux 6 | samba4 | Fixed | RHSA-2014:1009 | 05.08.2014 |
Red Hat Enterprise Linux 7 | samba | Fixed | RHSA-2014:0867 | 09.07.2014 |
Показывать по
Дополнительная информация
Статус:
EPSS
3.3 Low
CVSS2
Связанные уязвимости
The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x ...
The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
Уязвимость программного обеспечения Samba, позволяющая злоумышленнику нарушить доступность защищаемой информации
EPSS
3.3 Low
CVSS2