CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
Low
EPSS
Percentile
96.3%
The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests.
Vendor | Product | Version | CPE |
---|---|---|---|
samba | samba | 3.0.1 | cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:* |
samba | samba | 3.0.2 | cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:* |
samba | samba | 3.0.3 | cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:* |
samba | samba | 3.0.4 | cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:* |
samba | samba | 3.0.5 | cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:* |
samba | samba | 3.0.6 | cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:* |
samba | samba | 3.0.7 | cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:* |
samba | samba | 3.0.8 | cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:* |
samba | samba | 3.0.9 | cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:* |
samba | samba | 3.0.10 | cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:* |
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
docs.info.apple.com/article.html?artnum=304829
lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
secunia.com/advisories/20980
secunia.com/advisories/20983
secunia.com/advisories/21018
secunia.com/advisories/21019
secunia.com/advisories/21046
secunia.com/advisories/21086
secunia.com/advisories/21143
secunia.com/advisories/21159
secunia.com/advisories/21187
secunia.com/advisories/21190
secunia.com/advisories/21262
secunia.com/advisories/22875
secunia.com/advisories/23155
security.gentoo.org/glsa/glsa-200607-10.xml
securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html
securitytracker.com/id?1016459
slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.416876
www.debian.org/security/2006/dsa-1110
www.kb.cert.org/vuls/id/313836
www.mandriva.com/security/advisories?name=MDKSA-2006:120
www.novell.com/linux/security/advisories/2006_17_sr.html
www.redhat.com/support/errata/RHSA-2006-0591.html
www.samba.org/samba/security/CAN-2006-3403.html
www.securityfocus.com/archive/1/439757/100/0/threaded
www.securityfocus.com/archive/1/439875/100/0/threaded
www.securityfocus.com/archive/1/439880/100/100/threaded
www.securityfocus.com/archive/1/440767/100/0/threaded
www.securityfocus.com/archive/1/440836/100/0/threaded
www.securityfocus.com/archive/1/448957/100/0/threaded
www.securityfocus.com/archive/1/451404/100/0/threaded
www.securityfocus.com/archive/1/451417/100/200/threaded
www.securityfocus.com/archive/1/451426/100/200/threaded
www.securityfocus.com/bid/18927
www.ubuntu.com/usn/usn-314-1
www.us-cert.gov/cas/techalerts/TA06-333A.html
www.vmware.com/download/esx/esx-202-200610-patch.html
www.vmware.com/download/esx/esx-213-200610-patch.html
www.vupen.com/english/advisories/2006/2745
www.vupen.com/english/advisories/2006/4502
www.vupen.com/english/advisories/2006/4750
exchange.xforce.ibmcloud.com/vulnerabilities/27648
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355