On Fri, Mar 23, 2018 at 07:03:42AM +1300, Andrew Bartlett wrote: > > Since (afaics) there is no known exploit I cannot really test this, but > > I believe 3.6.6-6+deb7u15 is also vulnerable and the ">4.0.0" is only > > claimed to be non-affected because the samba developers don't support > > < 4.0.0 anymore. Is that the case? > No, that isn't how we write our advisories.
great! (though I would consider it a valid approach, if clearly stated)
> The code does appear to be
> in 3.6 so hopefully you get a researched answer to your query on the
> bug.
>
> > What's your recommendation what should be done here? To me it seems we
> > should fix 3.6.6 in oldoldstable and then also notify others that <4.0.0
> > is vulnerable, but I have no idea how to best communicate the latter.
>
> This was always a very minor concern, a DoS in a non-default
> configuration.
>
> The patch still applies but the DoS becomes a self-DoS (kill your own
> connection) unless those options are set (which is rare, in my view).
ok, its exploitable, just not with default options. So I think its worth
fixing.
Thanks!
--
cheers,
Holger
signature.asc
Description: PGP signature
