Exploit the possiblities


Posted Sep 13, 2004
Site idefense.com

Samba 3.0.x is susceptible to multiple denial of services bugs that can remotely crash the daemons nmbd and smbd.

tags | advisory, denial of service
advisories | CVE-2004-0807, CVE-2004-0808
MD5 | 3a2867406071785f82ebec0f354d676a


Change Mirror Download
Hash: SHA1

Subject: Samba 3.0.x Denial of Service Flaw

Summary: (i) A DoS bug in smbd may allow an
unauthenticated user to cause smbd to
spawn new processes each one entering
an infinite loop. After sending a sufficient
amount of packets it is possible to exhaust
the memory resources on the server.

(ii) A DoS bug in nmbd may allow an attacker
to remotely crash the nmbd daemon.

Versions: Defect (i) affects Samba 3.0.x prior to and
including v3.0.6.

Defect (ii) affects Samba 3.0.x prior to
and including v3.0.6.

Availability: The patch file for Samba 3.0.5 addressing both
bugs (samba-3.0.5-DoS.patch) can be downloaded

- -----------

CAN-2004-0807: A defect in smbd's ASN.1 parsing allows an
attacker to send a specially crafted packet during the
authentication request which will send the newly spawned
smbd process into an infinite loop. Given enough of these
packets, it is possible to exhaust the available memory
on the server.

CAN-2004-0808: A defect in nmbd's process of mailslot packets
can allow an attacker to anonymously crash nmbd.

Protecting Unpatched Servers
- ----------------------------

The Samba Team always encourages users to run the latest stable
release as a defense of against attacks. However, under certain
circumstances it may not be possible to immediately upgrade
important installations. In such cases, administrators should
read the "Server Security" documentation found at

- --------

Both security issues were reported to Samba developers by
iDEFENSE (http://www.idefense.com/). The defect discovery
was anonymously reported to iDEFENSE via their Vulnerability
Contributor Program (http://www.idefense.com/poi/teams/vcp.jsp).

- --
Our Code, Our Bugs, Our Responsibility.

-- The Samba Team

Version: GnuPG v1.2.4 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org



RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?

Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

February 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Feb 1st
    15 Files
  • 2
    Feb 2nd
    15 Files
  • 3
    Feb 3rd
    15 Files
  • 4
    Feb 4th
    13 Files
  • 5
    Feb 5th
    16 Files
  • 6
    Feb 6th
    15 Files
  • 7
    Feb 7th
    15 Files
  • 8
    Feb 8th
    15 Files
  • 9
    Feb 9th
    18 Files
  • 10
    Feb 10th
    8 Files
  • 11
    Feb 11th
    8 Files
  • 12
    Feb 12th
    17 Files
  • 13
    Feb 13th
    15 Files
  • 14
    Feb 14th
    15 Files
  • 15
    Feb 15th
    17 Files
  • 16
    Feb 16th
    18 Files
  • 17
    Feb 17th
    37 Files
  • 18
    Feb 18th
    2 Files
  • 19
    Feb 19th
    16 Files
  • 20
    Feb 20th
    6 Files
  • 21
    Feb 21st
    0 Files
  • 22
    Feb 22nd
    0 Files
  • 23
    Feb 23rd
    0 Files
  • 24
    Feb 24th
    0 Files
  • 25
    Feb 25th
    0 Files
  • 26
    Feb 26th
    0 Files
  • 27
    Feb 27th
    0 Files
  • 28
    Feb 28th
    0 Files

Top Authors In Last 30 Days

File Tags


packet storm

© 2018 Packet Storm. All rights reserved.

Security Services
Hosting By