CVE-2014-0239

Priority
Medium
Description
The internal DNS server in Samba 4.x before 4.0.18 does not check the QR
field in the header section of an incoming DNS message before sending a
response, which allows remote attackers to cause a denial of service (CPU
and bandwidth consumption) via a forged response packet that triggers a
communication loop, a related issue to CVE-1999-0103.
References
Notes
 mdeslaur> 4.x only
Assigned-to
mdeslaur
Package
Upstream:needs-triage
Ubuntu 12.04 LTS (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 15.04 (Vivid Vervet):DNE
Ubuntu 15.10 (Wily Werewolf):DNE
Package
Source: samba (LP Ubuntu Debian)
Upstream:released (4.0.18)
Ubuntu 12.04 LTS (Precise Pangolin):not-affected
Ubuntu 14.04 LTS (Trusty Tahr):released (2:4.1.6+dfsg-1ubuntu2.14.04.2)
Ubuntu 15.04 (Vivid Vervet):not-affected (2:4.1.8+dfsg-1ubuntu1)
Ubuntu 15.10 (Wily Werewolf):not-affected (2:4.1.8+dfsg-1ubuntu1)
Patches:
Upstream:http://git.samba.org/?p=samba.git;a=commit;h=bb0871c3ec44f6fb5fbd01e0f1522dfd7934cfe5
More Information

Valid XHTML 1.0 Strict

Updated: 2015-07-29 20:20:32 UTC (commit 9756)