CVE-2014-0244

CVE information

Published

7 years ago

Last Modified

3 years ago

CVSSv2.0 Severity

Low

Impact Analysis

Description

The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet..

CVSSv2.0 Score

Severity
Low
Base Score
3.3/10
Exploit Score
6.5/10
Access Vector
Adjacent_network
Access Complexity
Low
Authentication Required
None
Impact Score
2.9/10
Confidentiality Impact
None
Availability Impact
Partial
Integrity Impact
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*
  Yes
- -
cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*
  Yes
- -

Get started for free to scan for vulnerabilities

Companies of all sizes use Mageni to scan their assets for vulnerabilities. Mageni is free for 7-days then $39 monthly regardless of how many IPs, scans, deployments or users you have. Cancel at Anytime and 7-days Money-Back Guarantee. Developed and supported by certified CompTIA PenTest+ professionals. Mageni contributes 1% of your subscription to removing CO₂ from the atmosphere.

Get Started For Free
App screenshot