CVE-2014-0239 PUBLISHED

The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.

EPSS 22.16% · 95.7th percentile

Risk Scores

EPSS Score
22.16%
95.7th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSsamba0, 2:3.6.18-1ubuntu3, 2:4.0.10+dfsg-4ubuntu2

Timeline

References

Open in Interactive Console →