vulnerability
Oracle Linux: CVE-2017-9461: ELSA-2017-1950: samba security, bug fix, and enhancement update (LOW)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:N/I:N/A:C) | Feb 16, 2017 | Aug 8, 2017 | Dec 3, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:N/I:N/A:C)
Published
Feb 16, 2017
Added
Aug 8, 2017
Modified
Dec 3, 2025
Description
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
A flaw was found in the way Samba handled dangling symlinks. An authenticated malicious Samba client could use this flaw to cause the smbd daemon to enter an infinite loop and use an excessive amount of CPU and memory.
A flaw was found in the way Samba handled dangling symlinks. An authenticated malicious Samba client could use this flaw to cause the smbd daemon to enter an infinite loop and use an excessive amount of CPU and memory.
Solutions
oracle-linux-upgrade-libsmbclientoracle-linux-upgrade-libsmbclient-develoracle-linux-upgrade-libwbclientoracle-linux-upgrade-libwbclient-develoracle-linux-upgrade-sambaoracle-linux-upgrade-samba-clientoracle-linux-upgrade-samba-client-libsoracle-linux-upgrade-samba-commonoracle-linux-upgrade-samba-common-libsoracle-linux-upgrade-samba-common-toolsoracle-linux-upgrade-samba-dcoracle-linux-upgrade-samba-dc-libsoracle-linux-upgrade-samba-develoracle-linux-upgrade-samba-krb5-printingoracle-linux-upgrade-samba-libsoracle-linux-upgrade-samba-pidloracle-linux-upgrade-samba-pythonoracle-linux-upgrade-samba-testoracle-linux-upgrade-samba-test-libsoracle-linux-upgrade-samba-vfs-glusterfsoracle-linux-upgrade-samba-winbindoracle-linux-upgrade-samba-winbind-clientsoracle-linux-upgrade-samba-winbind-krb5-locatororacle-linux-upgrade-samba-winbind-modules
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.