[UNIX] Samba smbd Memory Exhaustion DoS



The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html

- - - - - - - - -



Samba smbd Memory Exhaustion DoS
------------------------------------------------------------------------


SUMMARY

"The <http://www.samba.org/> smbd daemon maintains internal data
structures used track active connections to file and printer shares."

smbd may allow internal structures maintaining state for share connections
to grow unbounded.

DETAILS

Vulnerable Systems:
* Samba version 3.0.1 and above
* Samba version 3.0.22 and prior

In certain circumstances an attacker may be able to continually increase
the memory usage of an smbd process by issuing a large number of share
connection requests. This defect affects all Samba configurations.

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2006-3403>
CAN-2006-3403

Vendor Status:
The vendor has issued a patch:
Index: source/smbd/service.c
-==================================================================
--- source/smbd/service.c (revision 16676)
+++ source/smbd/service.c (working copy)
@@ -763,6 +763,11 @@
smb_panic("make_connection: PANIC ERROR. Called as nonroot\n");
}

+ if (conn_num_open() > 2047) {
+ *status = NT_STATUS_INSUFF_SERVER_RESOURCES;
+ return NULL;
+ }
+
if(lp_security() != SEC_SHARE) {
vuser = get_valid_user_struct(vuid);
if (!vuser) {



ADDITIONAL INFORMATION

The information has been provided by <mailto:jerry@xxxxxxxxx> Gerald
(Jerry) Carter.
The original article can be found at:
<http://www.samba.org/samba/security/CAN-2006-3403.html>
http://www.samba.org/samba/security/CAN-2006-3403.html
The patch can be downloaded at:
<http://us4.samba.org/samba/ftp/patches/security/samba-3.0-CAN-2006-3403.patch> http://us4.samba.org/samba/ftp/patches/security/samba-3.0-CAN-2006-3403.patch



========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@xxxxxxxxxxxxxx
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@xxxxxxxxxxxxxx


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.



Relevant Pages

  • [UNIX] Samba Services Remote Denial Of Service Vulnerabilities
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... A remote attacker is able to crash the Samba nmbd service thereby creating ... sending multiple malformed requests to an affected server. ...
    (Securiteam)
  • [UNIX] Samba 3.x QFILEPATHINFO Unicode Filename Buffer Overflow
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Samba is an Open Source/Free Software suite that provides seamless file ... September 2004 - Disclosure was delayed on our side because of another ... vulnerability affects default installations of Samba 3.x and therefore any ...
    (Securiteam)
  • [UNIX] Samba 3.x SWAT Preauthentication Buffer Overflow
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... exists a remote pre-authentication buffer overflow in Samba 3.x SWAT ... 29 April 2004 - vulnerability details has been made available to VulnDisco ... The technical details and exploit code have been provided by ...
    (Securiteam)
  • [UNIX] Samba Arbitrary File Access Vulnerability
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... Remote exploitation of an input validation vulnerability in Samba allows ... Successful exploitation allows remote attackers to bypass the specified ...
    (Securiteam)
  • [UNIX] Samba FindNextPrintChangeNotify Error Allows Remote Authenticated Users To Crash smbd
    ... The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com ... A Samba client can crash a remote Samba daemon under certain ... Vendor Status: ...
    (Securiteam)