search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Samba fails to properly handle multiple share connection requests

Vulnerability Note VU#313836

Original Release Date: 2006-07-18 | Last Revised: 2006-07-26


There is a vulnerability in the smbd process which may allow an attacker to create a denial of service condition.


Samba is an open-source implementation of SMB/CIFS file and print services. It is frequently included in UNIX and Linux distributions and is typically used provide file and print services to Windows clients.

The smbd daemon is used to track connections to SMB network shares and printers.

The Problem
By sending a large number of share requests, an attacker can exhaust the system resources available to the smbd process.


An attacker may be able to cause a denial of service condition by exhausting the system resources used by the smbd daemon.


See the vendor of your operating system for patched smbd packages. Users who compile Samba from source should refer to the Samba webpage to obtain a patched version of the software.


Restrict Access
Blocking the SMB protocol at the network perimeter will reduce exposure to this vulnerability. Servers using the SMB protocol typically use ports 139/tcp and 445/tcp.

Disable Unnecessary Daemons
Do not enable the smbd daemon on systems that do not need to use the SMB protocol. Some operating systems have the smbd daemon started by default.

Vendor Information


Samba Affected

Notified:  July 11, 2006 Updated: July 17, 2006



Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

CVSS Metrics

Group Score Vector



Thanks to the Samba team for reporting this vulnerability.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-3403
Severity Metric: 0.24
Date Public: 2006-07-10
Date First Published: 2006-07-18
Date Last Updated: 2006-07-26 12:02 UTC
Document Revision: 70

Sponsored by CISA.