{"id":"AZL-27661","summary":"CVE-2023-34966 affecting package samba 4.12.5-7","details":"An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.","modified":"2026-04-01T05:09:23.455050Z","published":"2023-07-20T15:15:11Z","upstream":["CVE-2023-34966"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-34966"}],"affected":[{"package":{"name":"samba","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/samba"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"last_affected":"4.12.5-7"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-27661.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}