Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
Secunia - Advisories - Samba Printer Change Notification Request Denial of Service Vulnerability
[go: Go Back, main page]


Secunia - Stay Secure
Secunia monitors vulnerabilities in more than 6500 products, e.g.:
Internet Explorer | Mozilla Firefox | Opera | View All Products
Home >> Secunia Advisories >> Samba Printer Change Notification Request Denial of Service Vulnerability

Secunia Advisories
Historic Advisories
Listed By Product
Listed By Vendor
Statistics
About Advisories
Secunia Research

Virus Information
Chronological List
Last 10 Virus Alerts
About Virus Info

Secunia Advisories
Weekly Summary
Secunia Virus Alerts


Samba Printer Change Notification Request Denial of Service Vulnerability

Secunia Advisory:SA12397Print Advisory  
Release Date:2004-08-30
Last Update:2004-09-10

Critical:
Not critical
Impact:DoS
Where:From local network
Solution Status:Vendor Patch

Software:Samba 2.x

Select a product and view a complete list of all Patched/Unpatched Secunia advisories affecting it.

Description:
NOTE: Based on new information from the vendor, this is NOT a security issue and the advisory has therefore been revoked.

A vulnerability has been reported in Samba, which can be exploited by malicious people to cause a DoS (Denial of Service).

The vulnerability is caused due to an error within the handling of client printer change notification requests. This can be exploited to crash smbd by sending a "FindNextPrintChangeNotify()" request without first sending a "FindFirstPrintChangeNotify()" request.

The issue can reportedly be triggered by Windows XP SP2 clients.

Solution:
Update to version 2.2.11.
http://www.samba.org/

Provided and/or discovered by:
Reported by vendor.

Changelog:
2004-09-10: New information from the Samba team states that this can only be exploited by clients to crash their own connection. This is therefore NOT a security issue.

Original Advisory:
http://us1.samba.org/samba/history/samba-2.2.11.html


Please note: The information, which this Secunia Advisory is based upon, comes from third party unless stated otherwise.

Secunia collects, validates, and verifies all vulnerability reports issued by security research groups, vendors, and others.


Send Feedback to Secunia:

If you have new information regarding this Secunia advisory or a product in our database, please send it to us using either our web form or email us at vuln@secunia.com.

Ideas, suggestions, and other feedback is most welcome.


Found: 4 Related Secunia Security Advisories

- Samba Security Descriptor Parsing Integer Overflow Vulnerability
- Samba Arbitrary File Access Vulnerability
- Samba Two Buffer Overflow Vulnerabilities
- Samba Packet Fragment Re-assembly Buffer Overflow


Receive all Secunia Security Advisories Free:


Read more about our mailing list.





Search



Secunia News

2005-11-21
Proof of Concept code has been released for a 6 months old Internet Explorer vulnerability. Criticality rating increased to Extremely Critical.

- - - - - - - - -

2005-06-21
Multiple browsers are vulnerable to the Dialog Origin Spoofing Vulnerability.

- - - - - - - - -

2005-04-04
Various Mozilla browsers are vulnerable to the Mozilla Arbitrary Memory Exposure Vulnerability.

- - - - - - - - -

2005-03-17
Want a new IT Security job?
Vacant positions at Secunia


Secunia Feeds

Secunia Advisories
Get the RSS feed or use our HTML version.

Secunia Virus Alerts
Get the RSS feed.

Special Requests
Special requests for your website can be sent to our support, or read more about featuring Secunia information here.


Terms & Conditions - Confidentiality - Copyright Secunia - Compliance - Contact Secunia