Samba DNS Packet Header "reply" Flag Denial Of Service Vulnerability
Publish Date: 21 de июля de 2015
Severity: : Medium
Advisory Date: 21 de июля de 2015
DESCRIPTION
The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.
INFORMATION EXPOSURE
Apply associated Trend Micro DPI Rules.
SOLUTION
Trend Micro Deep Security DPI Rule Number: 1006110