Description: Spotlight的SambamdssvcRPC服务中发现无限循环漏洞。解析客户端发送的SpotlightmdssvcRPC数据包时,核心解组函数sl_unpack_loop()未验证网络数据包中包含类似数组结构中的元素计数的字段。通过传递0作为计数值,被攻击的函数将无限循环运行,消耗100%CPU。此缺陷允许攻击者发出格式错误的RPC请求,触发无限循环,从而导致拒绝服务情况。 Broken commit info: Bugfix commit info: https://download.samba.orghttps://download.samba.org/pub/samba/ftp/patches/security/samba-4.17.10-security-2023-07-19.patch https://download.samba.orghttps://download.samba.org/pub/samba/ftp/patches/security/samba-4.18.5-security-2023-07-19.patch https://download.samba.orghttps://download.samba.org/pub/samba/ftp/patches/security/samba-4.16.11-security-2023-07-19.patch
PR: https://gitee.com/src-anolis-os/samba/pulls/36