Wednesday, March 5, 2025
HomeLinuxSamba Vulnerability Leads to DoS in DNServer and Can Crash Active Directory...

Samba Vulnerability Leads to DoS in DNServer and Can Crash Active Directory Services

Published on

SIEM as a Service

Follow Us on Google News

Samba released security updates for a couple of vulnerabilities that could cause Denial of Service in dnsserver and LDAP server crash.

Denial of Service in DNS Server

The vulnerability allows an authenticated user to crash the RPC server via a NULLpointer de-reference. The DNS server RPC provides admin access to manager DNS records and zones.

Following are the affected Samba version 4.9 and 4.10, and it has been fixed with Samba 4.9.9 and 4.10.5. The vulnerability can be tracked as CVE-2019-12435 and has CVSS:3.0 severity score 6.5.

Samba also suggested a workaround by setting ‘dcerpc endpoint servers = -dnsserver‘ in the smb.conf and restarting Samba.

LDAP server crash

All the versions of Samba since 4.10.0 are affected with the vulnerability, a user with read access can crash the LDAP server process, but it depends on the Samba version and process model, “this may crash only the user’s own connection.”

“Specifically, while in Samba 4.10, the default is for one process per connected client, site-specific configuration trigger can change this.”

Samba versions since 4.10.0 are affected, and it has been fixed with 4.10.5. The vulnerability can be tracked as CVE-2019-12436 and has CVSS:3.0 severity score 6.5.

Samba suggested a workaround “return to the default configuration by running ‘samba’ with -M standard, however, this may consume more memory and would not address the \DC\homes issue.”

Administrators are recommended to update this release or apply the patch as soon as possible to address Samba Vulnerability.

Follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

SambaCry Vulnerability used in Deploying Payloads Targeting IoT devices Particularly NAS

SambaCry Vulnerability used by Hackers to attack Linux Servers and Mine’s Cryptocurrency

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Pathfinder AI – Hunters Announces New AI Capabilities for Smarter SOC Automation

Pathfinder AI expands Hunters' vision for AI-driven SOCs, introducing Agentic AI for autonomous investigation...

Google Secretly Tracks Android Devices Even Without User-Opened Apps

A recent technical study conducted by researchers at Trinity College Dublin has revealed that...

LLMjacking – Hackers Abuse GenAI With AWS NHIs to Hijack Cloud LLMs

In a concerning development, cybercriminals are increasingly targeting cloud-based generative AI (GenAI) services in...

Microsoft Strengthens Trust Boundary for VBS Enclaves

Microsoft has introduced a series of technical recommendations to bolster the security of Virtualization-Based...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

CISA Warns of Active Exploitation of Microsoft Windows Win32k Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2018-8639, a decade-old Microsoft Windows...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...