Samba Vulnerability Leads to DoS in DNServer and Can Crash Active Directory Services

Samba released security updates for a couple of vulnerabilities that could cause Denial of Service in dnsserver and LDAP server crash.

Denial of Service in DNS Server

The vulnerability allows an authenticated user to crash the RPC server via a NULLpointer de-reference. The DNS server RPC provides admin access to manager DNS records and zones.

Following are the affected Samba version 4.9 and 4.10, and it has been fixed with Samba 4.9.9 and 4.10.5. The vulnerability can be tracked as CVE-2019-12435 and has CVSS:3.0 severity score 6.5.

Samba also suggested a workaround by setting ‘dcerpc endpoint servers = -dnsserver‘ in the smb.conf and restarting Samba.

LDAP server crash

All the versions of Samba since 4.10.0 are affected with the vulnerability, a user with read access can crash the LDAP server process, but it depends on the Samba version and process model, “this may crash only the user’s own connection.”

“Specifically, while in Samba 4.10, the default is for one process per connected client, site-specific configuration trigger can change this.”

Samba versions since 4.10.0 are affected, and it has been fixed with 4.10.5. The vulnerability can be tracked as CVE-2019-12436 and has CVSS:3.0 severity score 6.5.

Samba suggested a workaround “return to the default configuration by running ‘samba’ with -M standard, however, this may consume more memory and would not address the \DC\homes issue.”

Administrators are recommended to update this release or apply the patch as soon as possible to address Samba Vulnerability.

Follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

SambaCry Vulnerability used in Deploying Payloads Targeting IoT devices Particularly NAS

SambaCry Vulnerability used by Hackers to attack Linux Servers and Mine’s Cryptocurrency

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Zero-Trust Policy Bypass Enables Exploitation of Vulnerabilities and Manipulation of NHI Secrets

A new project has exposed a critical attack vector that exploits protocol vulnerabilities to disrupt…

2 days ago

Threat Actor Sells Burger King Backup System RCE Vulnerability for $4,000

A threat actor known as #LongNight has reportedly put up for sale remote code execution…

2 days ago

Chinese Nexus Hackers Exploit Ivanti Endpoint Manager Mobile Vulnerability

Ivanti disclosed two critical vulnerabilities, identified as CVE-2025-4427 and CVE-2025-4428, affecting Ivanti Endpoint Manager Mobile…

2 days ago

Hackers Target macOS Users with Fake Ledger Apps to Deploy Malware

Hackers are increasingly targeting macOS users with malicious clones of Ledger Live, the popular application…

2 days ago

EU Targets Stark Industries in Cyberattack Sanctions Crackdown

The European Union has escalated its response to Russia’s ongoing campaign of hybrid threats, announcing…

2 days ago

Venice.ai’s Unrestricted Access Sparks Concerns Over AI-Driven Cyber Threats

Venice.ai has rapidly emerged as a disruptive force in the AI landscape, positioning itself as…

2 days ago