Posts

Samba read_nttrans_ea_list Function DoS (Aug 22, 2013)

Samba, which runs on most Unix and Unix-like systems, is a free software re-implementation of the SMB/CIFS networking protocol. As of version 3, Samba provides file and print services for various Microsoft Windows clients and can integrate with a Windows Server domain. By default, a Samba server listens on 445/TCP for SMB over TCP.

A denial of service vulnerability exists in Samba. Specifically, the vulnerability is due to interger overflow in function read_nttrans_ea_list. A remote attacker can exploit this vulnerability by sending crafted requests to the target Samba server. Successful exploitation would cause memory exhaustion and result in denial-of-service condition.

The vulnerability has been assigned as CVE-2013-4124.

Dell SonicWALL has released an IPS signature to detect and block specific exploitation attempts targeting this vulnerability. The signature is listed below:

  • 7214 Samba read_nttrans_ea_list DoS