发布时间: 2023年7月29日
修改时间: 2024年10月31日
An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.
NVD | openEuler | |
---|---|---|
Confidentiality | None | None |
Attack Vector | Network | Network |
CVSS评分 | 7.5 | 7.5 |
Attack Complexity | Low | Low |
Privileges Required | None | None |
Scope | Unchanged | Unchanged |
Integrity | None | None |
User Interaction | None | None |
Availability | High | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2023-1570 | samba security update | 2023年7月29日 |
KylinSec-SA-2023-1571 | samba security update | 2023年7月29日 |
KylinSec-SA-2023-1602 | samba security update | 2023年7月29日 |
KylinSec-SA-2023-2213 | samba security update | 2023年7月29日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | samba | Fixed |
KY3.4-5A | samba | Fixed |
KY3.5.1 | samba | Fixed |
KY3.5.2 | samba | Fixed |