Synopsis: Moderate: samba security update
Advisory ID: SLSA-2014:0867-1
Issue Date: 2014-07-09
CVE Numbers: CVE-2014-0244
CVE-2014-3493
CVE-2014-0178
—
A denial of service flaw was found in the way the sys_recvfile() function
of nmbd, the NetBIOS message block daemon, processed non-blocking sockets.
An attacker could send a specially crafted packet that, when processed,
would cause nmbd to enter an infinite loop and consume an excessive amount
of CPU time. (CVE-2014-0244)
A flaw was found in the way Samba created responses for certain
authenticated client requests when a shadow-copy VFS module was enabled.
An attacker able to send an authenticated request could use this flaw to
disclose limited portions of memory per each request. (CVE-2014-0178)
It was discovered that smbd, the Samba file server daemon, did not
properly handle certain files that were stored on the disk and used a
valid Unicode character in the file name. An attacker able to send an
authenticated non-Unicode request that attempted to read such a file could
cause smbd to crash. (CVE-2014-3493)
After installing this update, the smb service will be restarted
automatically.
—
– Scientific Linux Development Team