Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 479868 (CVE-2013-4124) - <net-fs/samba-{3.5.22, 3.6.19, 4.0.8}: Packet Handling Denial of Service Vulnerability (CVE-2013-4124)
Summary: <net-fs/samba-{3.5.22, 3.6.19, 4.0.8}: Packet Handling Denial of Service Vuln...
Alias: CVE-2013-4124
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
Whiteboard: B3 [glsa]
Depends on:
Reported: 2013-08-05 20:29 UTC by Agostino Sarubbo
Modified: 2015-02-26 08:58 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2013-08-05 20:29:55 UTC
From ${URL} :


A vulnerability has been reported in Samba, which can be exploited by malicious people to cause a 
DoS (Denial of Service).

The vulnerability is caused due to an unspecified error when handling malformed packets and can be 
exploited to exhaust memory resources by sending a specially crafted packet.

Successful exploitation requires a connection to a file share.

The vulnerability is reported in versions 3.0.x through 4.0.7.

Update to version 3.5.22, 3.6.17, or 4.0.8.

Provided and/or discovered by:
The vendor credits Jeremy Allison, Google.

Original Advisory:

@maintainer(s): after the bump, in case we need to stabilize the package, please say explicitly if it is ready for the stabilization or not.
Comment 1 Agostino Sarubbo gentoo-dev 2013-08-23 14:23:16 UTC
We have a public exploit now:
Comment 2 GLSAMaker/CVETool Bot gentoo-dev 2013-08-27 02:48:06 UTC
CVE-2013-4124 (
  Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd
  in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows
  remote attackers to cause a denial of service (memory consumption) via a
  malformed packet.
Comment 3 Sergey Popov gentoo-dev 2013-08-29 10:42:12 UTC
Ebuilds are in tree

@samba: please tell us explicitly if they are ready for stabilization
Comment 4 Chris Reffett (RETIRED) gentoo-dev Security 2013-10-04 18:13:05 UTC
Maintainer timeout. Arches, please test and stabilize:
Target arches: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86

Target arches: alpha amd64 arm hppa ia64 ppc ppc64 sparc x86

(4.0.8 ~ and masked, so we don't need to do anything there)
Comment 5 Agostino Sarubbo gentoo-dev 2013-10-05 10:38:46 UTC
amd64 stable
Comment 6 Agostino Sarubbo gentoo-dev 2013-10-06 07:58:10 UTC
x86 stable
Comment 7 Jeroen Roovers (RETIRED) gentoo-dev 2013-10-06 14:06:22 UTC
Stable for HPPA.
Comment 8 Markus Meier gentoo-dev 2013-10-06 20:23:16 UTC
arm stable
Comment 9 Agostino Sarubbo gentoo-dev 2013-10-07 19:31:29 UTC
ppc stable
Comment 10 Agostino Sarubbo gentoo-dev 2013-10-11 14:06:29 UTC
alpha stable
Comment 11 Agostino Sarubbo gentoo-dev 2013-10-11 14:06:56 UTC
ia64 stable
Comment 12 Agostino Sarubbo gentoo-dev 2013-10-11 14:07:23 UTC
ppc64 stable
Comment 13 Agostino Sarubbo gentoo-dev 2013-10-11 14:07:50 UTC
sparc stable
Comment 14 Yury German Gentoo Infrastructure gentoo-dev 2013-10-14 03:18:57 UTC
Maintainers, please clean up vulnerable versions of:  net-fs/samba 
Thank you.
Comment 15 Yury German Gentoo Infrastructure gentoo-dev 2013-12-30 06:29:36 UTC

Maintainer(s), please drop the vulnerable version.

3.5.21 still in tree (only one left from this vulnerability)
Comment 16 Yury German Gentoo Infrastructure gentoo-dev 2014-06-18 01:42:47 UTC
Maintainer(s), Thank you for cleanup!

Added to an existing GLSA request.
Comment 17 GLSAMaker/CVETool Bot gentoo-dev 2015-02-26 08:58:52 UTC
This issue was resolved and addressed in
 GLSA 201502-15 at
by GLSA coordinator Kristian Fiskerstrand (K_F).