1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
2 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
3 <html xmlns="http://www.w3.org/1999/xhtml">
6 <title>Samba - Security Announcement Archive</title>
11 <H2>CVE-2015-3223.html:</H2>
15 ===========================================================
16 == Subject: Denial of service in Samba Active Directory
19 == CVE ID#: CVE-2015-3223
21 == Versions: Samba 4.0.0 to 4.3.2
23 == Summary: Malicious request can cause Samba LDAP server
24 == to hang, spinning using CPU.
26 ===========================================================
32 All versions of Samba from 4.0.0 to 4.3.2 inclusive (resp. all
33 ldb versions up to 1.1.23 inclusive) are vulnerable to
34 a denial of service attack in the samba daemon LDAP server.
36 A malicious client can send packets that cause the LDAP server in the
37 samba daemon process to become unresponsive, preventing the server
38 from servicing any other requests.
40 This flaw is not exploitable beyond causing the code to loop expending
47 Patches addressing this defect have been posted to
49 https://www.samba.org/samba/history/security.html
51 Additionally, Samba 4.3.3, 4.2.7 and 4.1.22 (resp. ldb 1.1.24)
52 have been issued as security releases to correct the defect.
53 Samba vendors and administrators running affected versions are
54 advised to upgrade or apply the patch as soon as possible.
66 This problem was found by Thilo Uttendorfer of Linux Information
67 Systems AG. The fix was created by Jeremy Allison of Google.