5
CVSSv2

CVE-2006-3403

Published: 12/07/2006 Updated: 18/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The smdb daemon (smbd/service.c) in Samba 3.0.1 up to and including 3.0.22 allows remote malicious users to cause a denial of service (memory consumption) via a large number of share connection requests.

Vulnerable Product Search on Vulmon Subscribe to Product

samba samba 3.0.13

samba samba 3.0.14

samba samba 3.0.2

samba samba 3.0.20a

samba samba 3.0.3

samba samba 3.0.4

samba samba 3.0.1

samba samba 3.0.10

samba samba 3.0.16

samba samba 3.0.17

samba samba 3.0.21a

samba samba 3.0.21b

samba samba 3.0.8

samba samba 3.0.9

samba samba 3.0.14a

samba samba 3.0.15

samba samba 3.0.20b

samba samba 3.0.21

samba samba 3.0.5

samba samba 3.0.6

samba samba 3.0.7

samba samba 3.0.11

samba samba 3.0.12

samba samba 3.0.18

samba samba 3.0.19

samba samba 3.0.21c

samba samba 3.0.22

Vendor Advisories

Debian Bug report logs - #378070 CVE-2006-3403: Memory exhaustion DoS against smbd Package: samba; Maintainer for samba is Debian Samba Maintainers <pkg-samba-maint@listsaliothdebianorg>; Source for samba is src:samba (PTS, buildd, popcon) Reported by: Geoff Crompton <geoffcrompton@strategicdatacomau> Date: Thu ...
The Samba security team reported a Denial of Service vulnerability in the handling of information about active connections In certain circumstances an attacker could continually increase the memory usage of the smbd process by issuing a large number of share connection requests By draining all available memory, this could be exploited to render ...

References

NVD-CWE-Otherhttp://www.samba.org/samba/security/CAN-2006-3403.htmlhttp://www.securityfocus.com/bid/18927http://secunia.com/advisories/20980http://secunia.com/advisories/20983http://www.debian.org/security/2006/dsa-1110http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.416876http://www.ubuntu.com/usn/usn-314-1http://securitytracker.com/id?1016459http://secunia.com/advisories/21018http://secunia.com/advisories/21019http://secunia.com/advisories/21046http://secunia.com/advisories/21086http://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.htmlhttp://www.kb.cert.org/vuls/id/313836http://secunia.com/advisories/21143http://security.gentoo.org/glsa/glsa-200607-10.xmlhttp://www.redhat.com/support/errata/RHSA-2006-0591.htmlhttp://www.novell.com/linux/security/advisories/2006_17_sr.htmlhttp://secunia.com/advisories/21187http://secunia.com/advisories/21190http://secunia.com/advisories/21159ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.aschttp://secunia.com/advisories/21262http://www.vmware.com/download/esx/esx-202-200610-patch.htmlhttp://www.vmware.com/download/esx/esx-213-200610-patch.htmlhttp://secunia.com/advisories/22875http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.htmlhttp://www.us-cert.gov/cas/techalerts/TA06-333A.htmlhttp://secunia.com/advisories/23155http://www.mandriva.com/security/advisories?name=MDKSA-2006:120http://www.vupen.com/english/advisories/2006/2745http://www.vupen.com/english/advisories/2006/4502http://www.vupen.com/english/advisories/2006/4750http://docs.info.apple.com/article.html?artnum=304829https://exchange.xforce.ibmcloud.com/vulnerabilities/27648https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355http://www.securityfocus.com/archive/1/451426/100/200/threadedhttp://www.securityfocus.com/archive/1/451417/100/200/threadedhttp://www.securityfocus.com/archive/1/451404/100/0/threadedhttp://www.securityfocus.com/archive/1/448957/100/0/threadedhttp://www.securityfocus.com/archive/1/440836/100/0/threadedhttp://www.securityfocus.com/archive/1/440767/100/0/threadedhttp://www.securityfocus.com/archive/1/439880/100/100/threadedhttp://www.securityfocus.com/archive/1/439875/100/0/threadedhttp://www.securityfocus.com/archive/1/439757/100/0/threadedhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378070https://usn.ubuntu.com/314-1/https://nvd.nist.govhttps://www.kb.cert.org/vuls/id/313836