GLSA 200607-10: Samba: Denial of Service vulnerability
Severity: | normal |
Title: | Samba: Denial of Service vulnerability |
Date: | 07/25/2006 |
Bugs: |
|
ID: | 200607-10 |
Synopsis
A large number of share connection requests could cause a Denial of Service within Samba.Background
Samba is a freely available SMB/CIFS implementation which allows seamless interoperability of file and print services to other SMB/CIFS clients.
Affected packages
Package | Vulnerable | Unaffected | Architecture(s) |
---|---|---|---|
net-fs/samba | < 3.0.22-r3 | >= 3.0.22-r3 | All supported architectures |
Description
During an internal audit the Samba team discovered that a flaw in the way Samba stores share connection requests could lead to a Denial of Service.
Impact
By sending a large amount of share connection requests to a vulnerable Samba server, an attacker could cause a Denial of Service due to memory consumption.
Workaround
There is no known workaround at this time.
Resolution
All Samba users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.22-r3"
References
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2010 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.