On Mon, Feb 28, 2011 at 4:35 PM, Karolin Seeger <[email protected]> wrote: > Samba 3.5.7, 3.4.12 and 3.3.15 are security releases in order to > address CVE-2011-0719. > > o CVE-2011-0719: > All current released versions of Samba are vulnerable to > a denial of service caused by memory corruption. Range > checks on file descriptors being used in the FD_SET macro > were not present allowing stack corruption. This can cause > the Samba code to crash or to loop attempting to select > on a bad file descriptor set.
Hello dear Samba team, Could you please clarify one thing here - does that DoS/loop happen with _only_ smbd serving that malicious client, or that would crash the whole Samba service? thanks, Alexander -- To unsubscribe from this list go to the following URL and read the instructions: https://lists.samba.org/mailman/options/samba
