Search for vulnerabilities
Vulnerability details: VCID-tgsk-8gbr-aaaa
Vulnerability ID VCID-tgsk-8gbr-aaaa
Aliases CVE-2006-3403
Summary The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests.
Status Published
Exploitability 0.5
Weighted Severity 8.0
Risk 4.0
Affected and Fixed Packages Package Details
Weaknesses (0)
There are no known CWE.
System Score Found at
rhas Important https://access.redhat.com/errata/RHSA-2006:0591
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.17710 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.19328 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.22075 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.22075 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.22075 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.22075 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
epss 0.29763 https://api.first.org/data/v1/epss?cve=CVE-2006-3403
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1618140
cvssv2 5.0 https://nvd.nist.gov/vuln/detail/CVE-2006-3403
Reference id Reference type URL
ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
http://docs.info.apple.com/article.html?artnum=304829
http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2006-3403.json
https://api.first.org/data/v1/epss?cve=CVE-2006-3403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3403
http://secunia.com/advisories/20980
http://secunia.com/advisories/20983
http://secunia.com/advisories/21018
http://secunia.com/advisories/21019
http://secunia.com/advisories/21046
http://secunia.com/advisories/21086
http://secunia.com/advisories/21143
http://secunia.com/advisories/21159
http://secunia.com/advisories/21187
http://secunia.com/advisories/21190
http://secunia.com/advisories/21262
http://secunia.com/advisories/22875
http://secunia.com/advisories/23155
http://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html
http://security.gentoo.org/glsa/glsa-200607-10.xml
http://securitytracker.com/id?1016459
https://exchange.xforce.ibmcloud.com/vulnerabilities/27648
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.416876
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355
http://www.debian.org/security/2006/dsa-1110
http://www.kb.cert.org/vuls/id/313836
http://www.mandriva.com/security/advisories?name=MDKSA-2006:120
http://www.novell.com/linux/security/advisories/2006_17_sr.html
http://www.redhat.com/support/errata/RHSA-2006-0591.html
http://www.samba.org/samba/security/CAN-2006-3403.html
http://www.securityfocus.com/archive/1/439757/100/0/threaded
http://www.securityfocus.com/archive/1/439875/100/0/threaded
http://www.securityfocus.com/archive/1/439880/100/100/threaded
http://www.securityfocus.com/archive/1/440767/100/0/threaded
http://www.securityfocus.com/archive/1/440836/100/0/threaded
http://www.securityfocus.com/archive/1/448957/100/0/threaded
http://www.securityfocus.com/archive/1/451404/100/0/threaded
http://www.securityfocus.com/archive/1/451417/100/200/threaded
http://www.securityfocus.com/archive/1/451426/100/200/threaded
http://www.securityfocus.com/bid/18927
http://www.ubuntu.com/usn/usn-314-1
http://www.us-cert.gov/cas/techalerts/TA06-333A.html
http://www.vmware.com/download/esx/esx-202-200610-patch.html
http://www.vmware.com/download/esx/esx-213-200610-patch.html
http://www.vupen.com/english/advisories/2006/2745
http://www.vupen.com/english/advisories/2006/4502
http://www.vupen.com/english/advisories/2006/4750
1618140 https://bugzilla.redhat.com/show_bug.cgi?id=1618140
378070 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=378070
cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*
CVE-2006-3403 https://nvd.nist.gov/vuln/detail/CVE-2006-3403
GLSA-200607-10 https://security.gentoo.org/glsa/200607-10
RHSA-2006:0591 https://access.redhat.com/errata/RHSA-2006:0591
USN-314-1 https://usn.ubuntu.com/314-1/
No exploits are available.
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2006-3403
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Exploit Prediction Scoring System (EPSS)
Percentile 0.96264
EPSS Score 0.17710
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.