The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Samba | Samba | 3.0.0 (including) | 3.0.0 (including) |
Samba | Samba | 3.0.1 (including) | 3.0.1 (including) |
Samba | Samba | 3.0.2 (including) | 3.0.2 (including) |
Samba | Samba | 3.0.2a (including) | 3.0.2a (including) |
Samba | Samba | 3.0.3 (including) | 3.0.3 (including) |
Samba | Samba | 3.0.4 (including) | 3.0.4 (including) |
Samba | Samba | 3.0.4-rc1 (including) | 3.0.4-rc1 (including) |
Samba | Samba | 3.0.5 (including) | 3.0.5 (including) |
Samba | Samba | 3.0.6 (including) | 3.0.6 (including) |
Samba | Ubuntu | devel | * |
Red Hat Enterprise Linux 3 | RedHat | samba-0:3.0.7-1.3E | * |