DNS: Samba DNS Reply Flag Denial of Service

This signature detects attempts to exploit a known vulnerability in the Samba DNS Reply Flag. The server fails to check the reply flag of DNS packets, making it vulnerable to reply to a spoofed reply. This could result in a "ping-pong" type attack where two vulnerable servers attack each other. An attacker could exploit this vulnerability by sending a DNS query to a vulnerable server with a spoofed source IP address of another vulnerable server. Successful exploitation could result in excessive consumption of resources on both vulnerable servers, possibly causing a denial of service condition.

Extended Description

The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.

Affected Products

Samba samba

References

BugTraq: 67691

CVE: CVE-2014-0239

Short Name
DNS:SAMBA-DNS-REPLY-FLAG-DOS
Severity
Major
Recommended
False
Recommended Action
None
Category
DNS
Keywords
CVE-2014-0239 DNS Denial Flag Reply Samba Service bid:67691 of
Release Date
06/12/2015
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3603
False Positive
Unknown
Vendors

Samba

CVSS Score

5.0

Found a potential security threat?