Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-1999-0810: Denial of service in Samba NETBIOS name service daemon (nmbd).

0
High
VulnerabilityCVE-1999-0810cve-1999-0810denial of service
Published: Wed Jul 21 1999 (07/21/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: samba
Product: samba

Description

Denial of service in Samba NETBIOS name service daemon (nmbd).

AI-Powered Analysis

AILast updated: 06/27/2025, 19:24:59 UTC

Technical Analysis

CVE-1999-0810 is a critical vulnerability affecting the Samba NETBIOS name service daemon (nmbd), specifically version 2.0.5. Samba is an open-source implementation of the SMB/CIFS networking protocol, widely used to provide file and print services to SMB/CIFS clients, including Windows systems. The NETBIOS name service daemon (nmbd) handles name resolution and browsing services for SMB networks. This vulnerability allows an unauthenticated remote attacker to cause a denial of service (DoS) condition by exploiting flaws in the nmbd process. The CVSS v3.1 vector (AV:N/AC:L/Au:N/C:C/I:C/A:C) indicates that the attack can be launched remotely over the network with low attack complexity and no authentication required. The impact is severe, affecting confidentiality, integrity, and availability, as the service can be crashed or disrupted, potentially halting SMB-related network operations. Given the age of the vulnerability (published in 1999) and the lack of a patch, it is likely that this version of Samba is obsolete and unsupported. However, if legacy systems still run this version, they remain vulnerable to remote DoS attacks that could disrupt critical file sharing and network services.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if legacy Samba 2.0.5 instances are still in use, especially in industrial, governmental, or research environments where older systems may persist. A successful DoS attack against nmbd can disrupt SMB name resolution, leading to failures in accessing shared resources, network drives, and printers. This disruption can halt business operations, cause data unavailability, and potentially lead to cascading failures in network-dependent applications. Confidentiality and integrity impacts are also indicated by the CVSS vector, suggesting that exploitation might allow attackers to interfere with or intercept SMB communications, although the primary documented impact is DoS. European organizations relying on Samba for cross-platform file sharing, especially those with legacy infrastructure, are at risk of operational downtime and associated financial and reputational damage.

Mitigation Recommendations

Given that no patch is available for this specific version, the primary mitigation is to upgrade Samba to a supported and patched version immediately. Organizations should conduct an inventory to identify any systems running Samba 2.0.5 and remove or upgrade them. Network segmentation and firewall rules should be implemented to restrict access to the nmbd service (UDP port 137) to trusted hosts only, minimizing exposure to untrusted networks. Intrusion detection and prevention systems should be configured to monitor and block suspicious traffic targeting NETBIOS services. Additionally, organizations should consider disabling the NETBIOS name service if it is not required, or migrating to more secure name resolution protocols such as DNS. Regular network and vulnerability scans should be performed to detect legacy Samba versions and ensure compliance with security policies.

Need more detailed analysis?Upgrade to Pro Console

Threat ID: 682ca32cb6fd31d6ed7df10b

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 6/27/2025, 7:24:59 PM

Last updated: 2/7/2026, 5:46:40 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats