First published: Fri Aug 25 2023(Updated: )
This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Samba. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
Samba |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-CAN-20229 is classified as a high severity vulnerability due to its potential to cause a denial-of-service condition.
To fix ZDI-CAN-20229, ensure that you update your Samba installation to the latest patched version from the official vendor.
Any installations of Samba that have not been patched against this vulnerability are at risk of being affected by ZDI-CAN-20229.
Yes, ZDI-CAN-20229 can be exploited remotely without the need for authentication.
ZDI-CAN-20229 facilitates a denial-of-service attack, disrupting service availability on affected Samba installations.