Lucene search

K
sambaSamba SecuritySAMBA:CVE-2014-3493
HistoryJun 23, 2014 - 12:00 a.m.

Denial of service - Server crash/memory corruption

2014-06-2300:00:00
Samba Security
www.samba.org
499

2.7 Low

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:N/I:N/A:P

0.027 Low

EPSS

Percentile

90.4%

Description

All current released versions of Samba are vulnerable to a denial of
service on the smbd file server daemon.

Valid unicode path names stored on disk can cause smbd to
crash if an authenticated client attempts to read them
using a non-unicode request.

The crash is caused by memory being overwritten by
zeros at a 4GB offset from the expected return buffer
area, due to an invalid return code from a bad unicode
to Windows character set conversion.

Currently it is not believed to be exploitable by
an attacker, as there is no way to control the
exact area of memory being overwritten. However,
in the interests of safety this is being treated
as a security issue.

Patch Availability

A patch addressing this defect has been posted to

http://www.samba.org/samba/security/

Additionally, Samba 4.1.9, 4.0.19 and 3.6.24 have been issued as
security releases to correct the defect. Patches against older Samba
versions are available at http://samba.org/samba/patches/. Samba
vendors and administrators running affected versions are advised to
upgrade or apply the patch as soon as possible.

Workaround

None.

Credits

This problem was found and reported by Simon Arlott. The analysis
and fix were provided by Jeremy Allison of Google.

2.7 Low

CVSS2

Access Vector

ADJACENT_NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:A/AC:L/Au:S/C:N/I:N/A:P

0.027 Low

EPSS

Percentile

90.4%