Description
The ms_fnmatch function in Samba 3.0.4 and 3.0.7 and possibly other versions allows remote authenticated users to cause a denial of service (CPU consumption) via a SAMBA request that contains multiple * (wildcard) characters.
Product(s):
- Samba 3.0.0
- Samba 3.0.3
- Samba 3.0.4
- Samba 3.0.4 release candidate 1
- Samba 3.0.5
- Samba 3.0.6
- Samba 3.0.7
- SGI Samba 3.0.1 for IRIX
- SGI Samba 3.0.2 for IRIX
- SGI Samba 3.0.3 for IRIX
- SGI Samba 3.0.4 for IRIX
- SGI Samba 3.0.5 for IRIX
- SGI Samba 3.0.6 for IRIX
- SGI Samba 3.0.7 for IRIX
- SGI Samba 3.0 for IRIX
- Conectiva Linux 10.0
- Gentoo Linux
- Gentoo Linux 1.2
- Gentoo Linux 1.4
- Gentoo Linux 1.4 -
- Gentoo Linux 1.4 rc1
- Gentoo Linux 1.4 rc2
- Gentoo Linux 1.4 rc3
- Gentoo Linux 2.1.30 r9
- Gentoo Linux 2.2.28 r7
- Gentoo Linux 2.3.30 r2
- Red Hat Enterprise Linux 2.1 Advanced Server
- Red Hat Enterprise Linux 2.1 Advanced Server IA64
- Red Hat Enterprise Linux 2.1 Enterprise Server
- Red Hat Enterprise Linux 2.1 Enterprise Server IA64
- Red Hat Enterprise Linux 2.1 Workstation
- Red Hat Enterprise Linux 2.1 Workstation IA64
- Red Hat Enterprise Linux 3.0 Advanced Server Edition
- Red Hat Enterprise Linux 3.0 Enterprise Server Edition
- Red Hat Enterprise Linux 3.0 Workstation Server Edition
- Red Hat Desktop 3.0
- Red Hat Fedora Core Core 2.0
- Red Hat Fedora Core Core 3.0
- Red Hat Linux Advanced Workstation 2.1 on IA64
- Red Hat Linux Advanced Workstation 2.1 on Itanium Processor
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-0930, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-0930 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.