Bug 225519 - CVE-2007-0452 Samba smbd denial of service
CVE-2007-0452 Samba smbd denial of service
Product: Red Hat Enterprise Linux 5
Classification: Red Hat
Component: samba (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Simo Sorce
David Lawrence
: Security
Depends On:
  Show dependency treegraph
Reported: 2007-01-30 21:13 EST by Josh Bressers
Modified: 2007-11-30 17:07 EST (History)
2 users (show)

See Also:
Fixed In Version: RHSA-2007-0061
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2007-03-14 10:58:13 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Josh Bressers 2007-01-30 21:13:44 EST
+++ This bug was initially created as a clone of Bug #225513 +++

A bug has been found in Samba that can allow an authenticated user to cause a
child smbd process to enter an infinite loop.  The definition is rather
complicated so I'm going to paste the description from the upstream Samba advisory:

    Internally Samba's file server daemon, smbd, implements
    support for deferred file open calls in an attempt to serve
    client requests that would otherwise fail due to a share mode
    violation.  When renaming a file under certain circumstances
    it is possible that the request is never removed from the deferred
    open queue.  smbd will then become stuck is a loop trying to
    service the open request.

    This bug may allow an authenticated user to exhaust resources
    such as memory and CPU on the server by opening multiple CIFS
    sessions, each of which will normally spawn a new smbd process,
    and sending each connection into an infinite loop.

-- Additional comment from bressers@redhat.com on 2007-01-30 19:33 EST --
Created an attachment (id=146985)
Proposed upstream patch
Comment 2 Josh Bressers 2007-02-05 14:51:53 EST
This flaw is now public:
Comment 9 Red Hat Bugzilla 2007-03-14 10:58:13 EDT
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.