{"id":"CVE-2023-34966","details":"An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.","modified":"2026-04-10T04:59:42.461516Z","published":"2023-07-20T15:15:11.333Z","related":["ALSA-2023:6667","ALSA-2023:7139","MGASA-2023-0247","SUSE-SU-2023:2888-1","SUSE-SU-2023:2929-1","SUSE-SU-2023:2930-1","SUSE-SU-2023:3060-1","SUSE-SU-2023:3066-1","openSUSE-SU-2024:13071-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"},{"type":"ADVISORY","url":"https://www.samba.org/samba/security/CVE-2023-34966"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230731-0010/"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:6667"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2023:7139"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0423"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5477"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:0580"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2024:4101"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-34966"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2222793"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/samba-team/samba","events":[{"introduced":"0"},{"fixed":"225a003a043eee399b6d266d94440c399b6877e4"},{"introduced":"fbec737d9d3d992b54f52defcba62a304efef8f7"},{"fixed":"5eceb0dfb4a6490da3e7fc58f4b527b16b934195"},{"introduced":"a597a8767fabfe85ee0bcf869407e770a0c3e184"},{"fixed":"50a9b496556c08a451d8f18707fa709de69942ec"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"4.16.11"},{"introduced":"4.17.0"},{"fixed":"4.17.10"},{"introduced":"4.18.0"},{"fixed":"4.18.5"}]}}],"versions":["ldb-1.1.0","ldb-1.1.10","ldb-1.1.11","ldb-1.1.12","ldb-1.1.13","ldb-1.1.14","ldb-1.1.15","ldb-1.1.16","ldb-1.1.17","ldb-1.1.18","ldb-1.1.19","ldb-1.1.2","ldb-1.1.20","ldb-1.1.21","ldb-1.1.22","ldb-1.1.23","ldb-1.1.25","ldb-1.1.26","ldb-1.1.27","ldb-1.1.28","ldb-1.1.29","ldb-1.1.3","ldb-1.1.30","ldb-1.1.31","ldb-1.1.4","ldb-1.1.5","ldb-1.1.6","ldb-1.1.8","ldb-1.1.9","ldb-1.2.0","ldb-1.2.1","ldb-1.2.2","ldb-1.3.0","ldb-1.3.1","ldb-1.3.2","ldb-1.4.0","ldb-1.4.1","ldb-1.5.0","ldb-1.5.1","ldb-1.5.2","ldb-1.6.1","ldb-1.6.2","ldb-1.6.3","ldb-2.0.5","ldb-2.1.0","ldb-2.1.1","ldb-2.2.0","ldb-2.4.0","ldb-2.5.0","ldb-2.5.1","ldb-2.5.2","ldb-2.5.3","ldb-2.6.2","ldb-2.7.2","samba-4.0.0alpha10","samba-4.0.0alpha17","samba-4.0.0alpha18","samba-4.0.0alpha19","samba-4.0.0alpha20","samba-4.0.0alpha21","samba-4.0.0alpha6","samba-4.0.0alpha7","samba-4.0.0alpha8","samba-4.0.0alpha9","samba-4.0.0beta1","samba-4.0.0beta2","samba-4.0.0beta3","samba-4.0.0beta4","samba-4.0.0beta5","samba-4.0.0beta6","samba-4.0.0beta7","samba-4.0.0beta8","samba-4.0.0rc1","samba-4.10.0rc1","samba-4.11.0rc1","samba-4.12.0rc1","samba-4.13.0rc1","samba-4.14.0rc1","samba-4.15.0rc1","samba-4.16.0","samba-4.16.0rc1","samba-4.16.0rc2","samba-4.16.0rc3","samba-4.16.0rc4","samba-4.16.0rc5","samba-4.16.1","samba-4.16.10","samba-4.16.2","samba-4.16.3","samba-4.16.4","samba-4.16.5","samba-4.16.8","samba-4.16.9","samba-4.17.0","samba-4.17.1","samba-4.17.2","samba-4.17.4","samba-4.17.5","samba-4.17.6","samba-4.17.7","samba-4.17.8","samba-4.17.9","samba-4.18.0","samba-4.18.1","samba-4.18.2","samba-4.18.3","samba-4.18.4","samba-4.2.0rc1","samba-4.3.0rc1","samba-4.4.0rc1","samba-4.5.0rc1","samba-4.6.0rc1","samba-4.7.0rc1","samba-4.8.0rc1","samba-4.9.0rc1","talloc-1.3.1","talloc-2.0.0","talloc-2.0.7","talloc-2.0.8","talloc-2.1.0","talloc-2.1.1","talloc-2.1.10","talloc-2.1.11","talloc-2.1.12","talloc-2.1.13","talloc-2.1.14","talloc-2.1.15","talloc-2.1.16","talloc-2.1.2","talloc-2.1.3","talloc-2.1.4","talloc-2.1.5","talloc-2.1.6","talloc-2.1.7","talloc-2.1.8","talloc-2.1.9","talloc-2.2.0","talloc-2.3.0","talloc-2.3.1","talloc-2.3.2","talloc-2.3.3","tdb-1.1.5","tdb-1.2.0","tdb-1.2.1","tdb-1.2.10","tdb-1.2.11","tdb-1.2.12","tdb-1.2.13","tdb-1.3.0","tdb-1.3.1","tdb-1.3.10","tdb-1.3.11","tdb-1.3.12","tdb-1.3.13","tdb-1.3.14","tdb-1.3.15","tdb-1.3.16","tdb-1.3.17","tdb-1.3.18","tdb-1.3.2","tdb-1.3.3","tdb-1.3.4","tdb-1.3.5","tdb-1.3.6","tdb-1.3.7","tdb-1.3.8","tdb-1.3.9","tdb-1.4.0","tdb-1.4.1","tdb-1.4.2","tdb-1.4.3","tdb-1.4.4","tdb-1.4.5","tdb-1.4.6","tevent-0.10.0","tevent-0.10.1","tevent-0.10.2","tevent-0.11.0","tevent-0.9.11","tevent-0.9.12","tevent-0.9.13","tevent-0.9.14","tevent-0.9.15","tevent-0.9.16","tevent-0.9.17","tevent-0.9.18","tevent-0.9.19","tevent-0.9.20","tevent-0.9.21","tevent-0.9.22","tevent-0.9.23","tevent-0.9.24","tevent-0.9.25","tevent-0.9.26","tevent-0.9.27","tevent-0.9.28","tevent-0.9.29","tevent-0.9.30","tevent-0.9.31","tevent-0.9.32","tevent-0.9.33","tevent-0.9.34","tevent-0.9.35","tevent-0.9.36","tevent-0.9.37","tevent-0.9.38","tevent-0.9.39","tevent-0.9.8"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"38"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.0"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-34966.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}