On Fri, Mar 04, 2011 at 10:26:50AM +0300, Alexander wrote:
> > Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to
> > address CVE-2011-0719.
> >
> > o  CVE-2011-0719:
> >   All current released versions of Samba are vulnerable to
> >   a denial of service caused by memory corruption. Range
> >   checks on file descriptors being used in the FD_SET macro
> >   were not present allowing stack corruption. This can cause
> >   the Samba code to crash or to loop attempting to select
> >   on a bad file descriptor set.
> 
> Hello dear Samba team,
> 
> Could you please clarify one thing here - does that DoS/loop happen
> with _only_ smbd serving that malicious client, or that would crash
> the whole Samba service?

It will affect the smbd doing the service only. But under
heavy load it can also affect winbind.

With best regards,

Volker Lendecke

-- 
SerNet GmbH, Bahnhofsallee 1b, 37081 Göttingen
phone: +49-551-370000-0, fax: +49-551-370000-9
AG Göttingen, HRB 2816, GF: Dr. Johannes Loxen
-- 
To unsubscribe from this list go to the following URL and read the
instructions:  https://lists.samba.org/mailman/options/samba

Reply via email to