Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-34966

Опубликовано: 20 июл. 2023
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS3: 7.5

Описание

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

released

2:4.18.5+dfsg-1ubuntu1
esm-infra-legacy/trusty

released

2:4.3.11+dfsg-0ubuntu0.14.04.20+esm13
esm-infra/bionic

released

2:4.7.6+dfsg~ubuntu-0ubuntu2.29+esm1
esm-infra/focal

released

2:4.15.13+dfsg-0ubuntu0.20.04.3
esm-infra/xenial

released

2:4.3.11+dfsg-0ubuntu0.16.04.34+esm2
focal

released

2:4.15.13+dfsg-0ubuntu0.20.04.3
jammy

released

2:4.15.13+dfsg-0ubuntu1.2
kinetic

released

2:4.16.8+dfsg-0ubuntu1.2
lunar

released

2:4.17.7+dfsg-1ubuntu1.1

Показывать по

EPSS

Процентиль: 94%
0.13804
Средний

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
около 2 лет назад

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVSS3: 7.5
nvd
около 2 лет назад

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVSS3: 7.5
debian
около 2 лет назад

An infinite loop vulnerability was found in Samba's mdssvc RPC service ...

CVSS3: 7.5
github
около 2 лет назад

An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.

CVSS3: 7.5
fstec
около 2 лет назад

Уязвимость функции sl_unpack_loop() службы mdssvc RPC пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 94%
0.13804
Средний

7.5 High

CVSS3