Vulnerabilità: CVE-2006-3403

Il demone SMDB (smbd / service.c) in Samba 3.0.1 attraverso 3.0.22 permette attaccanti remoti di causare una negazione di servizio (consumo di memoria) con un gran numero di richieste di connessione quota.


http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
http://www.securityfocus.com/bid/18927
http://www.securityfocus.com/archive/1/439875/100/0/threaded
http://www.securityfocus.com/archive/1/439757/100/0/threaded
http://www.securityfocus.com/archive/1/439880/100/100/threaded
http://www.securityfocus.com/archive/1/440767/100/0/threaded
http://www.securityfocus.com/archive/1/440836/100/0/threaded
http://www.securityfocus.com/archive/1/451404/100/0/threaded
http://www.securityfocus.com/archive/1/451417/100/200/threaded
http://www.securityfocus.com/archive/1/451426/100/200/threaded
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
http://www.kb.cert.org/vuls/id/313836
http://docs.info.apple.com/article.html?artnum=304829
http://www.samba.org/samba/security/CAN-2006-3403.html
http://www.vmware.com/download/esx/esx-202-200610-patch.html
http://www.vmware.com/download/esx/esx-213-200610-patch.html
http://www.debian.org/security/2006/dsa-1110
http://security.gentoo.org/glsa/glsa-200607-10.xml
http://www.securityfocus.com/archive/1/448957/100/0/threaded
http://www.securityfocus.com/archive/1/448957/100/0/threaded
http://www.mandriva.com/security/advisories?name=MDKSA-2006:120
http://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355
http://www.redhat.com/support/errata/RHSA-2006-0591.html
http://securitytracker.com/id?1016459
http://secunia.com/advisories/20980
http://secunia.com/advisories/20983
http://secunia.com/advisories/21018
http://secunia.com/advisories/21019
http://secunia.com/advisories/21046
http://secunia.com/advisories/21086
http://secunia.com/advisories/21143
http://secunia.com/advisories/21159
http://secunia.com/advisories/21187
http://secunia.com/advisories/21190
http://secunia.com/advisories/21262
http://secunia.com/advisories/22875
http://secunia.com/advisories/23155
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.416876
http://www.novell.com/linux/security/advisories/2006_17_sr.html
http://www.ubuntu.com/usn/usn-314-1
http://www.vupen.com/english/advisories/2006/2745
http://www.vupen.com/english/advisories/2006/4502
http://www.vupen.com/english/advisories/2006/4750
https://exchange.xforce.ibmcloud.com/vulnerabilities/27648
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403


E' possibile lasciare un commento come utenti registrati al sito, accedendo tramite social, account wordpress oppure come utenti anonimi. Nel caso in cui si desideri lasciare un commento come utenti anonimi si verrà avvisati via email di un'eventuale risposta solo se si inserisce l'indirizzo email (facoltativo). L'inserimento di qualsiasi dato nei campi dei commenti è totalmente facoltativo. Chiunque decida di inserire un qualsiasi dato accetta il trattamento di questi ultimi per i fini inerenti al servizio ovvero la risposta al commento e le comunicazioni strettamente necessarie.


Rispondi