Vulnerability Note VU#313836

Samba fails to properly handle multiple share connection requests

Original Release date: 18 Jul 2006 | Last revised: 26 Jul 2006


There is a vulnerability in the smbd process which may allow an attacker to create a denial of service condition.


Samba is an open-source implementation of SMB/CIFS file and print services. It is frequently included in UNIX and Linux distributions and is typically used provide file and print services to Windows clients.

The smbd daemon is used to track connections to SMB network shares and printers.

The Problem
By sending a large number of share requests, an attacker can exhaust the system resources available to the smbd process.


An attacker may be able to cause a denial of service condition by exhausting the system resources used by the smbd daemon.


See the vendor of your operating system for patched smbd packages. Users who compile Samba from source should refer to the Samba webpage to obtain a patched version of the software.


Restrict Access
Blocking the SMB protocol at the network perimeter will reduce exposure to this vulnerability. Servers using the SMB protocol typically use ports 139/tcp and 445/tcp.

Disable Unnecessary Daemons
Do not enable the smbd daemon on systems that do not need to use the SMB protocol. Some operating systems have the smbd daemon started by default.

Systems Affected (Learn More)

VendorStatusDate NotifiedDate Updated
SambaAffected11 Jul 200617 Jul 2006
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A



Thanks to the Samba team for reporting this vulnerability.

This document was written by Ryan Giobbi.

Other Information

  • CVE IDs: CVE-2006-3403
  • Date Public: 10 Jul 2006
  • Date First Published: 18 Jul 2006
  • Date Last Updated: 26 Jul 2006
  • Severity Metric: 0.24
  • Document Revision: 60


If you have feedback, comments, or additional information about this vulnerability, please send us email.