The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "samba": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "libwbclient-dev": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "python-samba": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "registry-tools": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "samba-common-bin": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "samba-dsdb-modules": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "samba-libs": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "libsmbclient-dev": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "samba-doc": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "winbind": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "samba-vfs-modules": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "libsmbsharemodes0": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "samba-dbg": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "libnss-winbind": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "samba-common": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "libpam-winbind": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "smbclient": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "samba-testsuite": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "samba-dev": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "libparse-pidl-perl": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "libsmbclient": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "libwbclient0": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "libpam-smbpass": "2:4.1.6+dfsg-1ubuntu2.14.04.2", "libsmbsharemodes-dev": "2:4.1.6+dfsg-1ubuntu2.14.04.2" } ] }