Skip to main content

CVE-1999-0810: Denial of service in Samba NETBIOS name service daemon (nmbd).

High
VulnerabilityCVE-1999-0810cve-1999-0810denial of service
Published: Wed Jul 21 1999 (07/21/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: samba
Product: samba

Description

Denial of service in Samba NETBIOS name service daemon (nmbd).

AI-Powered Analysis

AILast updated: 06/27/2025, 19:24:59 UTC

Technical Analysis

CVE-1999-0810 is a critical vulnerability affecting the Samba NETBIOS name service daemon (nmbd), specifically version 2.0.5. Samba is an open-source implementation of the SMB/CIFS networking protocol, widely used to provide file and print services to SMB/CIFS clients, including Windows systems. The NETBIOS name service daemon (nmbd) handles name resolution and browsing services for SMB networks. This vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) condition by exploiting flaws in the nmbd process. The CVSS v3.1 vector (AV:N/AC:L/Au:N/C:C/I:C/A:C) indicates that the attack can be launched remotely over the network with low attack complexity and no authentication required. The impact is severe, affecting confidentiality, integrity, and availability, as the service can be crashed or disrupted, potentially halting SMB-related network operations. Given the age of the vulnerability (published in 1999) and the lack of a patch, it is likely that this version of Samba is obsolete and unsupported. However, if legacy systems still run this version, they remain vulnerable to remote DoS attacks that could disrupt critical file sharing and network services.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if legacy Samba 2.0.5 instances are still in use, especially in industrial, governmental, or research environments where older systems may persist. A successful DoS attack against nmbd can disrupt SMB name resolution, leading to failures in accessing shared resources, network drives, and printers. This disruption can halt business operations, cause data unavailability, and potentially lead to cascading failures in network-dependent applications. Confidentiality and integrity impacts are also indicated by the CVSS vector, suggesting that exploitation might allow attackers to interfere with or intercept SMB communications, although the primary documented impact is DoS. European organizations relying on Samba for cross-platform file sharing, especially those with legacy infrastructure, are at risk of operational downtime and associated financial and reputational damage.

Mitigation Recommendations

Given that no patch is available for this specific version, the primary mitigation is to upgrade Samba to a supported and patched version immediately. Organizations should conduct an inventory to identify any systems running Samba 2.0.5 and remove or upgrade them. Network segmentation and firewall rules should be implemented to restrict access to the nmbd service (UDP port 137) to trusted hosts only, minimizing exposure to untrusted networks. Intrusion detection and prevention systems should be configured to monitor and block suspicious traffic targeting NETBIOS services. Additionally, organizations should consider disabling the NETBIOS name service if it is not required, or migrating to more secure name resolution protocols such as DNS. Regular network and vulnerability scans should be performed to detect legacy Samba versions and ensure compliance with security policies.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7df10b

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 7:24:59 PM

Last updated: 8/17/2025, 2:10:16 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats