Severity
5.0MEDIUMNVD
EPSS
12.7%
top 6.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJun 17
Latest updateMay 14

Description

The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.

CVSS vector

AV:N/AC:L/C:N/I:N/A:PExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/samba< samba 2:3.6.1-2 (bookworm)
Debiansamba/samba< 2:3.6.1-2+3
NVDsamba/samba3.4.7+97

🔴Vulnerability Details

2
GHSA
GHSA-xvfw-jjhx-vm37: The chain_reply function in process2022-05-14
OSV
CVE-2010-1635: The chain_reply function in process2010-06-17

📋Vendor Advisories

3
Red Hat
samba: denial of service vulnerabilities2010-05-12
Debian
CVE-2010-1635: samba - The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x be...2010
Red Hat
kernel: nfsv4: kernel panic in nfs4_proc_lock()2008-10-22

💬Community

1
Bugzilla
CVE-2010-1635, CVE-2010-1642 samba: denial of service vulnerabilities2010-05-21