Samba Vulnerability Leads to DoS in DNServer and Can Crash Active Directory Services

Samba released security updates for a couple of vulnerabilities that could cause Denial of Service in dnsserver and LDAP server crash.

Denial of Service in DNS Server

The vulnerability allows an authenticated user to crash the RPC server via a NULLpointer de-reference. The DNS server RPC provides admin access to manager DNS records and zones.

Following are the affected Samba version 4.9 and 4.10, and it has been fixed with Samba 4.9.9 and 4.10.5. The vulnerability can be tracked as CVE-2019-12435 and has CVSS:3.0 severity score 6.5.

Samba also suggested a workaround by setting ‘dcerpc endpoint servers = -dnsserver‘ in the smb.conf and restarting Samba.

LDAP server crash

All the versions of Samba since 4.10.0 are affected with the vulnerability, a user with read access can crash the LDAP server process, but it depends on the Samba version and process model, “this may crash only the user’s own connection.”

“Specifically, while in Samba 4.10, the default is for one process per connected client, site-specific configuration trigger can change this.”

Samba versions since 4.10.0 are affected, and it has been fixed with 4.10.5. The vulnerability can be tracked as CVE-2019-12436 and has CVSS:3.0 severity score 6.5.

Samba suggested a workaround “return to the default configuration by running ‘samba’ with -M standard, however, this may consume more memory and would not address the \DC\homes issue.”

Administrators are recommended to update this release or apply the patch as soon as possible to address Samba Vulnerability.

Follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

SambaCry Vulnerability used in Deploying Payloads Targeting IoT devices Particularly NAS

SambaCry Vulnerability used by Hackers to attack Linux Servers and Mine’s Cryptocurrency

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Lumma Stealer Attacking Users To Steal Login Credentials From Browsers

Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…

2 days ago

New ‘OtterCookie’ Malware Attacking Software Developers Via Fake Job Offers

Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…

2 days ago

NjRat 2.3D Pro Edition Shared on GitHub: A Growing Cybersecurity Concern

The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…

2 days ago

Palo Alto Networks Vulnerability Puts Firewalls at Risk of DoS Attacks

A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…

2 days ago

Araneida Scanner – Hackers Using Cracked Version Of Acunetix Vulnerability Scanner

Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…

3 days ago

A Dark Web Operation Acquiring KYC Details TO Bypass Identity Verification Systems

A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…

3 days ago