The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
Link | Tags |
---|---|
http://www.trustix.net/errata/2004/0046/ | patch vendor advisory |
http://www.redhat.com/support/errata/RHSA-2004-467.html | patch vendor advisory |
http://www.idefense.com/application/poi/display?id=138&type=vulnerabilities | third party advisory patch vendor advisory |
http://marc.info/?l=bugtraq&m=109509335230495&w=2 | mailing list |
http://marc.info/?l=bugtraq&m=109526231623307&w=2 | mailing list |
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873 | patch vendor advisory |
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092 | vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344 | vdb entry signature |
http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml | patch vendor advisory |