CVE-2014-0239

Priority
Medium
Description
The internal DNS server in Samba 4.x before 4.0.18 does not check the QR
field in the header section of an incoming DNS message before sending a
response, which allows remote attackers to cause a denial of service (CPU
and bandwidth consumption) via a forged response packet that triggers a
communication loop, a related issue to CVE-1999-0103.
References
Notes
mdeslaur> 4.x only
Assigned-to
mdeslaur
Package
Upstream:needs-triage
Ubuntu 10.04 LTS (Lucid Lynx):ignored (reached end-of-life)
Ubuntu 12.04 LTS (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu 14.10 (Utopic Unicorn):DNE
Package
Source: samba (LP Ubuntu Debian)
Upstream:released (4.0.18)
Ubuntu 10.04 LTS (Lucid Lynx):not-affected
Ubuntu 12.04 LTS (Precise Pangolin):not-affected
Ubuntu 14.04 LTS (Trusty Tahr):released (2:4.1.6+dfsg-1ubuntu2.14.04.2)
Ubuntu 14.10 (Utopic Unicorn):not-affected (2:4.1.8+dfsg-1ubuntu1)
Patches:
Upstream:http://git.samba.org/?p=samba.git;a=commit;h=bb0871c3ec44f6fb5fbd01e0f1522dfd7934cfe5
More Information

Valid XHTML 1.0 Strict

Updated: 2014-10-23 21:18:19 UTC (commit 8644)