1 <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
2 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
3 <html xmlns="http://www.w3.org/1999/xhtml">
6 <title>Samba - Security Announcement Archive</title>
11 <H2>CVE-2014-0239.html:</H2>
15 ===========================================================
16 == Subject: Potential DOS in Samba internal DNS server
18 == CVE ID#: CVE-2014-0239
20 == Versions: All versions of Samba later than 4.0.0
22 == Summary: The internal DNS server does not check the "reply" flag,
23 == potentially causing a packet loop.
25 ===========================================================
31 Samba versions 4.0.0 and above have a flaw in DNS protocol handling in the
32 internal DNS server. The server will not check the "reply" flag in the DNS
33 packet header when processing a request. That makes it vulnerable to reply
34 to a spoofed reply packet with another reply. Two affected servers could thus
41 Patches addressing this issue have been posted to:
43 http://www.samba.org/samba/security/
45 Samba version 4.0.18 includes a patch for this issue.
51 Use the BIND_DLZ DNS backend to avoid this issue.
57 This problem was reported on IRC by a Samba user
59 Patch provided by Kai Blin of the Samba team.
61 ==========================================================
62 == Our Code, Our Bugs, Our Responsibility.
64 ==========================================================