First published: Wed May 12 2010(Updated: )
It was reported [1] that two vulnerabilities were found in Samba's smbd that would allow an attacker to trigger a null pointer dereference or an unitialized variable read by sending a specific 'Sessions Setup AndX' query. Successful exploitation of these issues would result in a denial of service. The upstream bug report [2] has a patch. [1] <a href="http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-(SS-2010-005">http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-(SS-2010-005</a>) [2] <a href="https://bugzilla.samba.org/show_bug.cgi?id=7254">https://bugzilla.samba.org/show_bug.cgi?id=7254</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba Samba | =3.0.19 | |
Samba Samba | =3.0.14a | |
Samba Samba | =3.0.27 | |
Samba Samba | =3.0.31 | |
Samba Samba | =3.0.3 | |
Samba Samba | =3.0.8 | |
Samba Samba | =3.2.15 | |
Samba Samba | =3.3.3 | |
Samba Samba | =3.5.1 | |
Samba Samba | =3.0.29 | |
Samba Samba | =3.0.25-pre2 | |
Samba Samba | =3.0.25b | |
Samba Samba | =3.2.5 | |
Samba Samba | =3.4.2 | |
Samba Samba | =3.2.3 | |
Samba Samba | =3.3 | |
Samba Samba | =3.0.2a | |
Samba Samba | =3.0.36 | |
Samba Samba | =3.4.0 | |
Samba Samba | =3.2.4 | |
Samba Samba | =3.0.5 | |
Samba Samba | =3.3.9 | |
Samba Samba | =3.0.28 | |
Samba Samba | =3.4.5 | |
Samba Samba | =3.0.32 | |
Samba Samba | =3.0.26a | |
Samba Samba | =3.2.13 | |
Samba Samba | =3.0.6 | |
Samba Samba | =3.4.6 | |
Samba Samba | =3.0.21a | |
Samba Samba | =3.0.34 | |
Samba Samba | =3.0.25-rc1 | |
Samba Samba | =3.0.23 | |
Samba Samba | =3.2.1 | |
Samba Samba | =3.0.4-rc1 | |
Samba Samba | =3.3.4 | |
Samba Samba | =3.0.33 | |
Samba Samba | =3.0.20a | |
Samba Samba | =3.4 | |
Samba Samba | =3.0.21b | |
Samba Samba | =3.0.27a | |
Samba Samba | =3.3.7 | |
Samba Samba | =3.4.1 | |
Samba Samba | =3.0.0 | |
Samba Samba | =3.0.9 | |
Samba Samba | =3.2.9 | |
Samba Samba | =3.0.11 | |
Samba Samba | =3.0.7 | |
Samba Samba | =3.0.13 | |
Samba Samba | =3.3.1 | |
Samba Samba | =3.2.2 | |
Samba Samba | =3.2.7 | |
Samba Samba | =3.0.20b | |
Samba Samba | =3.0.16 | |
Samba Samba | =3.2.10 | |
Samba Samba | =3.0.17 | |
Samba Samba | =3.2 | |
Samba Samba | =3.5 | |
Samba Samba | =3.0.21 | |
Samba Samba | =3.0.26 | |
Samba Samba | =3.0.14 | |
Samba Samba | =3.0.25-pre1 | |
Samba Samba | =3.0.30 | |
Samba Samba | =3.0.21c | |
Samba Samba | =3.3.11 | |
Samba Samba | =3.3.0 | |
Samba Samba | =3.0.23b | |
Samba Samba | =3.3.6 | |
Samba Samba | =3.0.25-rc3 | |
Samba Samba | =3.5.0 | |
Samba Samba | =3.0.2 | |
Samba Samba | =3.0.12 | |
Samba Samba | =3.2.12 | |
Samba Samba | =3.0.37 | |
Samba Samba | =3.0.20 | |
Samba Samba | =3.2.8 | |
Samba Samba | =3.0.35 | |
Samba Samba | =3.0.18 | |
Samba Samba | =3.0.25a | |
Samba Samba | =3.0.25c | |
Samba Samba | <=3.4.7 | |
Samba Samba | =3.3.2 | |
Samba Samba | =3.0.24 | |
Samba Samba | =3.0.10 | |
Samba Samba | =3.2.11 | |
Samba Samba | =3.4.4 | |
Samba Samba | =3.1.0 | |
Samba Samba | =3.4.3 | |
Samba Samba | =3.3.8 | |
Samba Samba | =3.2.14 | |
Samba Samba | =3.0.23d | |
Samba Samba | =3.0.25-rc2 | |
Samba Samba | =3.2.0 | |
Samba Samba | =3.3.5 | |
Samba Samba | =3.0.23c | |
Samba Samba | =3.0.15 | |
Samba Samba | =3.2.6 | |
Samba Samba | =3.0.23a | |
Samba Samba | =3.0.28a | |
Samba Samba | =3.0.4 | |
Samba Samba | =3.3.10 | |
Samba Samba | =3.0.25 | |
Samba Samba | =3.0.1 | |
Samba Samba | =3.0.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.