Secunia Security Advisory - A vulnerability has been reported in Samba 2.x, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error within the handling of client printer change notification requests. This can be exploited to crash smbd by sending a FindNextPrintChangeNotify() request without first sending a FindFirstPrintChangeNotify() request.
ee130cef4b714074de9166bee757621997f1bf5ef4e3f7f7b228aaffbbd958bb
TITLE:
Samba Printer Change Notification Request Denial of Service
Vulnerability
SECUNIA ADVISORY ID:
SA12397
VERIFY ADVISORY:
http://secunia.com/advisories/12397/
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
>From local network
SOFTWARE:
Samba 2.x
http://secunia.com/product/1271/
DESCRIPTION:
A vulnerability has been reported in Samba, which can be exploited by
malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error within the handling of
client printer change notification requests. This can be exploited to
crash smbd by sending a "FindNextPrintChangeNotify()" request without
first sending a "FindFirstPrintChangeNotify()" request.
The issue can reportedly be triggered by Windows XP SP2 clients.
SOLUTION:
Update to version 2.2.11.
http://www.samba.org/
PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.
ORIGINAL ADVISORY:
http://us1.samba.org/samba/history/samba-2.2.11.html
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------