Tuesday, May 28, 2024

Samba Vulnerability Leads to DoS in DNServer and Can Crash Active Directory Services

Samba released security updates for a couple of vulnerabilities that could cause Denial of Service in dnsserver and LDAP server crash.

Denial of Service in DNS Server

The vulnerability allows an authenticated user to crash the RPC server via a NULLpointer de-reference. The DNS server RPC provides admin access to manager DNS records and zones.

Following are the affected Samba version 4.9 and 4.10, and it has been fixed with Samba 4.9.9 and 4.10.5. The vulnerability can be tracked as CVE-2019-12435 and has CVSS:3.0 severity score 6.5.

Samba also suggested a workaround by setting ‘dcerpc endpoint servers = -dnsserver‘ in the smb.conf and restarting Samba.

LDAP server crash

All the versions of Samba since 4.10.0 are affected with the vulnerability, a user with read access can crash the LDAP server process, but it depends on the Samba version and process model, “this may crash only the user’s own connection.”

“Specifically, while in Samba 4.10, the default is for one process per connected client, site-specific configuration trigger can change this.”

Samba versions since 4.10.0 are affected, and it has been fixed with 4.10.5. The vulnerability can be tracked as CVE-2019-12436 and has CVSS:3.0 severity score 6.5.

Samba suggested a workaround “return to the default configuration by running ‘samba’ with -M standard, however, this may consume more memory and would not address the \DC\homes issue.”

Administrators are recommended to update this release or apply the patch as soon as possible to address Samba Vulnerability.

Follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

SambaCry Vulnerability used in Deploying Payloads Targeting IoT devices Particularly NAS

SambaCry Vulnerability used by Hackers to attack Linux Servers and Mine’s Cryptocurrency


Latest articles

CatDDoS Exploiting 80+ Vulnerabilities, Attacking 300+ Targets Daily

Malicious traffic floods targeted systems, servers, or networks in Distributed Denial of Service (DDoS)...

GNOME Remote Desktop Vulnerability Let Attackers Read Login Credentials

GNOME desktop manager was equipped with a new feature which allowed remote users to...

Kesakode: A Remote Hash Lookup Service To Identify Malware Samples

Today marks a significant milestone for Malcat users with the release of version 0.9.6,...

Cisco Firepower Vulnerability Let Attackers Launch SQL Injection Attacks

 A critical vulnerability has been identified in Cisco Firepower Management Center (FMC) Software's web-based...

Hackers Exploit WordPress Plugin to Steal Credit Card Data

Hackers have exploited an obscure WordPress plugin to inject malware into websites, specifically targeting...

Google Patches Chrome Zero-Day: Type Confusion in V8 JavaScript

Google has released a patch for a zero-day exploit in its Chrome browser.The...

Hackers Created Rogue VMs in Recent MITRE’s Cyber Attack

State-sponsored hackers recently exploited vulnerabilities in MITRE's Networked Experimentation, Research, and Virtualization Environment (NERVE).They...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Live API Attack Simulation

94% of organizations experience security problems in production APIs, and one in five suffers a data breach. As a result, cyber-attacks on APIs increased from 35% in 2022 to 46% in 2023, and this trend continues to rise.
Key takeaways include:

  • An exploit of OWASP API Top 10 vulnerability
  • A brute force ATO (Account Takeover) attack on API
  • A DDoS attack on an API
  • Positive security model automation to prevent API attacks

Related Articles