First published: Wed May 28 2014(Updated: )
The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Samba | >=4.0.0<4.0.18 | |
Samba | >=4.1.0<4.1.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-0239 has been rated as a medium severity vulnerability due to its potential for denial of service.
To fix CVE-2014-0239, users are advised to upgrade Samba to version 4.0.18 or later.
CVE-2014-0239 allows remote attackers to launch denial of service attacks through forged DNS response packets.
CVE-2014-0239 affects Samba versions before 4.0.18 and also versions between 4.1.0 and 4.1.8.
CVE-2014-0239 is a remote vulnerability, allowing attackers to exploit it without local access.