Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2014-0244
CVE information
Published
Last Modified
CVSSv2.0 Severity
Impact Analysis
Description
The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet..
CVSSv2.0 Score
- Severity
- Low
- Base Score
- 3.3/10
- Exploit Score
- 6.5/10
- Access Vector
- Adjacent_network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- None
- Availability Impact
- Partial
- Integrity Impact
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1097815
- http://www.samba.org/samba/security/CVE-2014-0244
- http://secunia.com/advisories/59834
- http://secunia.com/advisories/59848
- http://advisories.mageia.org/MGASA-2014-0279.html
- http://linux.oracle.com/errata/ELSA-2014-0866.html
- http://rhn.redhat.com/errata/RHSA-2014-0866.html
- http://secunia.com/advisories/59579
- http://secunia.com/advisories/59378
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:136
- http://secunia.com/advisories/59919
- http://security.gentoo.org/glsa/glsa-201502-15.xml
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:082
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
- https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
- http://www.securitytracker.com/id/1030455
- http://www.securityfocus.com/bid/68148
- http://secunia.com/advisories/61218
- http://secunia.com/advisories/59433
- http://secunia.com/advisories/59407
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
- http://www.securityfocus.com/archive/1/532757/100/0/threaded