The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T09:05:39.369Z
Reserved: 2013-12-03T00:00:00
Link: CVE-2014-0239

No data.

Status : Modified
Published: 2014-05-28T04:58:32.750
Modified: 2024-11-21T02:01:44.007
Link: CVE-2014-0239
