Vulnerabilites related to samba - samba
Vulnerability from fkie_nvd
Published
2016-04-25 00:59
Modified
2025-04-12 10:46
Summary
The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.
References
secalert@redhat.comhttp://badlock.org/
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0611.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0612.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0613.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0614.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0618.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0619.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0620.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0621.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0623.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0624.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0625.html
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3548
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
secalert@redhat.comhttp://www.securitytracker.com/id/1035533
secalert@redhat.comhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-1
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-2
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-3
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-4
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-5Third Party Advisory
secalert@redhat.comhttps://bto.bluecoat.com/security-advisory/sa122
secalert@redhat.comhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964Third Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/201612-47
secalert@redhat.comhttps://www.samba.org/samba/history/samba-4.2.10.html
secalert@redhat.comhttps://www.samba.org/samba/latest_news.html#4.4.2
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2016-2111.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://badlock.org/
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0611.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0612.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0613.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0614.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0618.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0619.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0620.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0621.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0623.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0624.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0625.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3548
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035533
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-2
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-3
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-4
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-5Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bto.bluecoat.com/security-advisory/sa122
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201612-47
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/history/samba-4.2.10.html
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/latest_news.html#4.4.2
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2016-2111.htmlPatch, Vendor Advisory
Impacted products
Vendor Product Version
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27
samba samba 3.0.27
samba samba 3.0.28
samba samba 3.0.28
samba samba 3.0.29
samba samba 3.0.30
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.0.34
samba samba 3.0.35
samba samba 3.0.36
samba samba 3.0.37
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12
samba samba 3.2.13
samba samba 3.2.14
samba samba 3.2.15
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.3.8
samba samba 3.3.9
samba samba 3.3.10
samba samba 3.3.11
samba samba 3.3.12
samba samba 3.3.13
samba samba 3.3.14
samba samba 3.3.15
samba samba 3.3.16
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4
samba samba 3.4.5
samba samba 3.4.6
samba samba 3.4.7
samba samba 3.4.8
samba samba 3.4.9
samba samba 3.4.10
samba samba 3.4.11
samba samba 3.4.12
samba samba 3.4.13
samba samba 3.4.14
samba samba 3.4.15
samba samba 3.4.16
samba samba 3.4.17
samba samba 3.5.0
samba samba 3.5.1
samba samba 3.5.2
samba samba 3.5.3
samba samba 3.5.4
samba samba 3.5.5
samba samba 3.5.6
samba samba 3.5.7
samba samba 3.5.8
samba samba 3.5.9
samba samba 3.5.10
samba samba 3.5.11
samba samba 3.5.12
samba samba 3.5.13
samba samba 3.5.14
samba samba 3.5.15
samba samba 3.5.16
samba samba 3.5.17
samba samba 3.5.18
samba samba 3.5.19
samba samba 3.5.20
samba samba 3.5.21
samba samba 3.5.22
samba samba 3.6.0
samba samba 3.6.1
samba samba 3.6.2
samba samba 3.6.3
samba samba 3.6.4
samba samba 3.6.5
samba samba 3.6.6
samba samba 3.6.7
samba samba 3.6.8
samba samba 3.6.9
samba samba 3.6.10
samba samba 3.6.11
samba samba 3.6.12
samba samba 3.6.13
samba samba 3.6.14
samba samba 3.6.15
samba samba 3.6.16
samba samba 3.6.17
samba samba 3.6.18
samba samba 3.6.19
samba samba 3.6.20
samba samba 3.6.21
samba samba 3.6.22
samba samba 3.6.23
samba samba 3.6.24
samba samba 3.6.25
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.0.11
samba samba 4.0.12
samba samba 4.0.13
samba samba 4.0.14
samba samba 4.0.15
samba samba 4.0.16
samba samba 4.0.17
samba samba 4.0.18
samba samba 4.0.19
samba samba 4.0.20
samba samba 4.0.21
samba samba 4.0.22
samba samba 4.0.23
samba samba 4.0.24
samba samba 4.0.25
samba samba 4.0.26
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.1.6
samba samba 4.1.7
samba samba 4.1.8
samba samba 4.1.9
samba samba 4.1.10
samba samba 4.1.11
samba samba 4.1.12
samba samba 4.1.13
samba samba 4.1.14
samba samba 4.1.15
samba samba 4.1.16
samba samba 4.1.17
samba samba 4.1.18
samba samba 4.1.19
samba samba 4.1.20
samba samba 4.1.21
samba samba 4.1.22
samba samba 4.1.23
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.1
samba samba 4.2.2
samba samba 4.2.3
samba samba 4.2.4
samba samba 4.2.5
samba samba 4.2.6
samba samba 4.2.7
samba samba 4.2.8
samba samba 4.2.9
samba samba 4.3.0
samba samba 4.3.1
samba samba 4.3.2
samba samba 4.3.3
samba samba 4.3.4
samba samba 4.3.5
samba samba 4.3.6
samba samba 4.4.0
canonical ubuntu_linux 14.04
canonical ubuntu_linux 15.10
canonical ubuntu_linux 16.04



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "A8CE218B-E64D-41DC-8CFD-9387427B72CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
              "matchCriteriaId": "9C2CDC66-8A44-4BEE-9574-FC69C38295A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
              "matchCriteriaId": "9AD55F6B-F753-41FC-8701-78A7DA556E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
              "matchCriteriaId": "0B63F362-A49C-401F-BE49-C6E1DC03E4F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
              "matchCriteriaId": "81F23C27-76CF-4906-B829-3B4F2E07900E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
              "matchCriteriaId": "EF6C8992-5210-483E-9EED-B7FC1EACA703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
              "matchCriteriaId": "EAF9C0EA-173A-4B02-9933-09DFAC31398D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "D87FDC2E-C6D9-4D10-BED6-B10C40232DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
              "matchCriteriaId": "A90CE26E-8993-49BA-91BF-536DBC44CAD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
              "matchCriteriaId": "33A9C2ED-355B-4903-ABC3-23C85B494053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
              "matchCriteriaId": "375BCF42-1A8A-4ACB-8198-FEA471A81B76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
              "matchCriteriaId": "C1C6E9D6-2964-4D63-9FCB-B4A02CC21975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
              "matchCriteriaId": "F8C1CA41-DBEF-46D7-9A94-930315BECACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
              "matchCriteriaId": "F6804F20-3B33-4FAA-ACC3-9658FF0770D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
              "matchCriteriaId": "0FFB13DF-53C5-4DF4-8D47-B40BD532E1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
              "matchCriteriaId": "49684CD5-4256-47CA-84BC-E319D8973314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
              "matchCriteriaId": "574ADE47-94CB-42A2-AE8E-A14FBB0EAFB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "254D9460-899D-4D06-AC47-1914A42FC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "427DA06C-9F5C-4E9A-A39F-22CD5E4F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60CED3E-B7A6-4674-ADD5-A3B047C7D125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "07906A18-FD60-42A5-AC17-21F677EA1762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "A99F7DCF-CBD0-4BC1-9C07-F1CB807614BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFC3F99-11F6-496E-BF55-53CF1E012FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C93E46D-FDEA-4B59-8C84-8A3DCC6AB3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4633D2E-2CBE-4B92-AD35-ED57C5399ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F200FC8-DA2E-4D39-8FF7-423759307DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B7341D-B02F-405B-81A0-5F74CFA8F8E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207B352-D8F8-4E15-9507-D3AD10D56211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBA51B-159F-42E9-8A2C-2B9BF1EB7D98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8F01226-D9E6-460C-975A-618932D5F16F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD98764-741C-4FED-BE4D-446E8E8D31F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4048DF8D-628D-4786-A883-0A1865DEBB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E7A4E4-940B-43C4-98A2-70F443A59120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82A06CD-338D-4095-BC7D-2E38050D388A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8C2E40-DA05-4B50-AB29-398AF71EBECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E81ED-032F-42B7-9D50-15CADE337AD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDD90A4-B50B-4640-ADDE-B75BBC34507C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFC3804-991A-4BAF-818E-E321DB21FB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE1B4D9-507A-43B2-81F3-77E411ABEF7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "857FCD47-F720-4273-BF1D-D5DC95ECA6D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8FE4AC-6E71-44CF-902D-BACA830C4CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EE762A-F95F-42CF-BB80-B0EF81A438EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "738095D8-8ACE-4CF4-9D97-4228FC686F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4634FC-DA4E-4B1D-B1AB-A45D8235780D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA83A66-BD39-4560-8EAF-ADF2433EF36D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B1F854-FC98-4DE9-8514-FD52301C5038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "388B4551-AF4C-46D6-840E-D489B05675C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F9D2E0-C795-4A5A-9398-4630B78FCB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D176AD-EA34-4DA2-9926-079438030E74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CF8CA5-0821-49CF-8B8C-2D2D5F63A061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A89C5FB-AA8B-41DC-93D5-81E199D73061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E71E10D0-E7C2-4D14-B685-4FB154B0A865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "05993D31-BC6D-44CD-808C-4A40F998BF0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "5560111D-8930-4B70-BD51-25343FBEED1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "406C2297-B58D-4623-9E7A-2C438ABBAC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6AF0DD4-08D4-4726-8A12-E979FF3322B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F98DE75F-84AD-42EE-B9DA-8AFF22D2BF3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3DAE05B-9086-4702-9586-77B34399E1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA544013-8FAC-4452-9D38-081C514E2981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DE15C9-3308-4DE0-8048-9B06AF4D7343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CB4968-F331-4653-8B9F-75BA4BB7A6D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3470D075-CCF2-42A1-A8C9-E375FC05FF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA72F88-6799-4E6C-B73C-C92616B04661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF17CB71-6E46-4A1E-9EAB-7D2E182D56C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E7FA486-73CE-4226-86C6-DA8383C5578F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17D2B72-19E2-4DE6-B1E3-F1823E2690BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC6922A-03CD-484A-BF40-F8F937428062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "8470C251-2874-4047-A759-F8D5C6D5C755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "332308A1-4BA4-4BC7-8B4B-7463CF98B664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7DEA84-27E5-4CF0-AC2A-B128BB5AE199",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "455B73D1-E8F1-478C-8CEB-79E4B5F33A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC49023-CAD6-4875-BF94-EEC290E8A5A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42BFAF8-5822-4782-B60D-BCB131834419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1FD9EF-A863-48C6-8471-AB1D80B3C1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B8A690-81D0-40C4-9301-CF1992C2DA0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC65AE61-426D-4072-90A1-667AD31B73C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EAFEF2-0FE6-4EE8-B879-79FC24A7F27F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E0C61-7718-4DBC-8F02-6F3C2CBE1783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "324AE9D7-C41F-493E-A1AD-FCD869D29D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "68519B1F-F315-4BBD-A4A3-4E1956D81E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF745E93-A92E-4AD7-8D42-36E9387C6915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4B760-417E-45D1-9CE1-AEBC8936BDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0DA221-078A-49DC-B0F1-F318FD785664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72BCA7B-6338-4A7C-AE71-E0B8F6C9F2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8F6AB9-A6C4-443E-A846-EE845BE24F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C8F7D7-BAAD-4F3A-BA39-44BE0CCADFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC522377-A6CD-4513-83B4-9ADC15F76B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC4595-5699-4237-BCD7-FD233BA1AECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EFCC9DB-4AA9-460E-87F0-1F74DEBB104B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FAC8F1-CB72-4DBD-9746-372246BEFEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44BD172-80FA-4260-BAFB-251A95E8C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09116D2-F168-4305-9A1D-88A1D42739A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "558E0B71-F79E-47B5-90CC-9C165BB15507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D7E102-DD54-43F2-B008-66F7C243477E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8066AB8C-1AE6-4DA3-91DB-4BF67DBBA279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A03CB9E-DEFC-4507-A314-5E0824A66462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6708D6E-2098-432D-820A-853032BD9A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "42BA346B-F7C6-4EB3-91BD-2CCC2B688AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B689AA-2074-4E9A-93BD-F910510A29AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF22E49-B259-4E13-B371-0C0173E534FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE5C0A8F-A502-4BC1-AC8A-45AE1D16371D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73876B7-A758-40CB-919D-6720AA7B9564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "84925F68-F440-4677-B3DF-F87EAC39E235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC0A0B3C-C011-4F27-BE8D-5A89BFC93F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7792A65-DB6E-49F4-9447-021EA9A82697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF3B982-B094-4B54-84A2-4CA199EE4E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6811F5-DDCA-4AED-9BF9-4C71550A727D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF1670DE-C3B6-4EA3-8132-66BBD4CEFAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AE10A1EF-F9CE-4126-9793-FB70A1D512A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7FA4DD6C-1531-420A-B271-EB16EA05470B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "AB6AEA9D-42C8-4C60-86AE-54DB2940A3B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2F221BF0-7B2B-4676-B8F2-2705C05B4034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C395C0-160C-4D8A-A3B6-7E30DD8721EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17EC5DF-2F00-479B-9775-45DA569BCED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CC31CBA-10A4-417C-A381-2BB7A68CE0D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D07800-4CCD-4B98-8D41-778295D1A3A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C4D3BA-781F-4C96-9234-73DB1593C7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AACDFB6-841E-42A5-AA8D-58E8A38D11D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD43D2C5-26D5-41AC-BC20-FACB68D22F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D186867E-18D6-4960-B8BE-A4353D941357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "23DAAAEB-EB1E-4BCD-B88E-33418E3FD1DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8643B45-1CE3-492F-BD82-65801F6C6FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F009D18-204C-4E6D-9827-9FBA9A4FFBA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "158DC9D2-2264-48B6-9116-CE6F0138D7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4339B46-E92A-4F7C-A0BA-62D7F7C428DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3D5E50-874B-48AE-B7C0-264DA0531847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "60C0F5A3-DB13-4BAC-B633-7E7F54FE34FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E28BFB7-FB1A-455E-BE0B-ADDEBFA9B9B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A0453F7-380D-4F29-9B54-D47AAAD9FFE6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel\u0027s endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005."
    },
    {
      "lang": "es",
      "value": "El servicio NETLOGON en Samba 3.x y 4.x en versiones anteriores a 4.2.11, 4.3.x en versiones anteriores a 4.3.8 y 4.4.x en versiones anteriores a 4.4.2, cuando un controlador de dominio est\u00e1 configurado, permite a atacantes remotos suplantar el nombre del computador de un dispositivo final de un canal seguro y obtener informaci\u00f3n sensible de sesi\u00f3n, ejecutando una aplicaci\u00f3n manipulada y aprovechando la habilidad para husmear tr\u00e1fico de red, un problema relacionado con CVE-2015-0005."
    }
  ],
  "id": "CVE-2016-2111",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-25T00:59:02.017",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://badlock.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2016/dsa-3548"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1035533"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-4"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bto.bluecoat.com/security-advisory/sa122"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2111.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://badlock.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bto.bluecoat.com/security-advisory/sa122"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2111.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-254"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-12-25 06:15
Modified
2025-04-14 19:15
Summary
PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has "a similar bug."
References
cve@mitre.orghttps://bugzilla.samba.org/show_bug.cgi?id=15203Exploit, Issue Tracking, Patch, Third Party Advisory
cve@mitre.orghttps://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3cThird Party Advisory
cve@mitre.orghttps://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583Patch, Third Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/202309-06
cve@mitre.orghttps://security.gentoo.org/glsa/202310-06
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20230216-0008/
cve@mitre.orghttps://security.netapp.com/advisory/ntap-20230223-0001/
cve@mitre.orghttps://web.mit.edu/kerberos/advisories/Vendor Advisory
cve@mitre.orghttps://web.mit.edu/kerberos/krb5-1.19/Release Notes, Vendor Advisory
cve@mitre.orghttps://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txtVendor Advisory
cve@mitre.orghttps://www.samba.org/samba/security/CVE-2022-42898.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=15203Exploit, Issue Tracking, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3cThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202309-06
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202310-06
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20230216-0008/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20230223-0001/
af854a3a-2127-422b-91ae-364da2661108https://web.mit.edu/kerberos/advisories/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://web.mit.edu/kerberos/krb5-1.19/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2022-42898.htmlThird Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DDDCA5D-623C-47CD-A5D3-BD16A066BEBC",
              "versionEndExcluding": "1.19.4",
              "versionStartIncluding": "1.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mit:kerberos_5:1.20:-:*:*:*:*:*:*",
              "matchCriteriaId": "C4D88C23-3917-4891-B9D0-694FCC55B6A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:mit:kerberos_5:1.20:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "BEDE8B47-EBE0-487C-A52A-8D5F0F5AD851",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "537FE65E-6E3F-4441-8B35-7B48214EA04D",
              "versionEndExcluding": "7.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "659BA682-BA94-493F-8EE1-235661CC958D",
              "versionEndExcluding": "4.15.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8363DE-B7A3-409B-A485-29B4FA053BFB",
              "versionEndExcluding": "4.16.7",
              "versionStartIncluding": "4.16.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "663B7A0D-CCBB-4EDC-A0E3-97F03E636BD2",
              "versionEndExcluding": "4.17.3",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "PAC parsing in MIT Kerberos 5 (aka krb5) before 1.19.4 and 1.20.x before 1.20.1 has integer overflows that may lead to remote code execution (in KDC, kadmind, or a GSS or Kerberos application server) on 32-bit platforms (which have a resultant heap-based buffer overflow), and cause a denial of service on other platforms. This occurs in krb5_pac_parse in lib/krb5/krb/pac.c. Heimdal before 7.7.1 has \"a similar bug.\""
    },
    {
      "lang": "es",
      "value": "El an\u00e1lisis sint\u00e1ctico de PAC en MIT Kerberos 5 (tambi\u00e9n conocido como krb5) antes de 1.19.4 y 1.20.x antes de 1.20.1 tiene desbordamientos de enteros que pueden conducir a la ejecuci\u00f3n remota de c\u00f3digo (en KDC, kadmind, o un servidor de aplicaciones GSS o Kerberos) en plataformas de 32 bits (que tienen un desbordamiento de b\u00fafer resultante), y causar una denegaci\u00f3n de servicio en otras plataformas. Esto ocurre en krb5_pac_parse en lib/krb5/krb/pac.c. Heimdal antes de 7.7.1 tiene \"un bug similar\"."
    }
  ],
  "id": "CVE-2022-42898",
  "lastModified": "2025-04-14T19:15:31.810",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-12-25T06:15:09.427",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=15203"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/202310-06"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.netapp.com/advisory/ntap-20230223-0001/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://web.mit.edu/kerberos/advisories/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://web.mit.edu/kerberos/krb5-1.19/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-42898.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=15203"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-64mq-fvfj-5x3c"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/krb5/krb5/commit/ea92d2f0fcceb54a70910fa32e9a0d7a5afc3583"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202310-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20230223-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://web.mit.edu/kerberos/advisories/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://web.mit.edu/kerberos/krb5-1.19/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://web.mit.edu/kerberos/krb5-1.20/README-1.20.1.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-42898.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-12-25 05:15
Modified
2025-04-15 14:15
Summary
Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).
Impacted products
Vendor Product Version
heimdal_project heimdal *
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "537FE65E-6E3F-4441-8B35-7B48214EA04D",
              "versionEndExcluding": "7.7.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "760EE8B5-7BCD-4BBD-81B8-3E12651AEA71",
              "versionEndExcluding": "4.15.3",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10AA6759-95FC-47A6-AA92-342893A2B23E",
              "versionEndExcluding": "4.16.8",
              "versionStartIncluding": "4.16.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E911B3-B4DD-451C-9579-74559328F89F",
              "versionEndExcluding": "4.17.4",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC)."
    },
    {
      "lang": "es",
      "value": "Heimdal anterior a 7.7.1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario debido a un free no v\u00e1lido en el c\u00f3dec ASN.1 utilizado por el Centro de distribuci\u00f3n de claves (KDC)."
    }
  ],
  "id": "CVE-2022-44640",
  "lastModified": "2025-04-15T14:15:35.400",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-12-25T05:15:11.103",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/202310-06"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/heimdal/heimdal/security/advisories/GHSA-88pm-hfmq-7vv4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202310-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-415"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-04-25 00:59
Modified
2025-04-12 10:46
Summary
The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.
References
secalert@redhat.comhttp://badlock.org/
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0611.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0612.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0613.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0614.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0618.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0619.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0620.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0621.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0623.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0624.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0625.html
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3548
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
secalert@redhat.comhttp://www.securitytracker.com/id/1035533
secalert@redhat.comhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-1
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-2
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-3
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-4
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-5
secalert@redhat.comhttps://bto.bluecoat.com/security-advisory/sa122
secalert@redhat.comhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
secalert@redhat.comhttps://security.gentoo.org/glsa/201612-47
secalert@redhat.comhttps://www.samba.org/samba/history/samba-4.2.10.html
secalert@redhat.comhttps://www.samba.org/samba/latest_news.html#4.4.2
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2016-2110.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://badlock.org/
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0611.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0612.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0613.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0614.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0618.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0619.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0620.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0621.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0623.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0624.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0625.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3548
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035533
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-2
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-3
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-4
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-5
af854a3a-2127-422b-91ae-364da2661108https://bto.bluecoat.com/security-advisory/sa122
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201612-47
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/history/samba-4.2.10.html
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/latest_news.html#4.4.2
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2016-2110.htmlPatch, Vendor Advisory
Impacted products
Vendor Product Version
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27
samba samba 3.0.27
samba samba 3.0.28
samba samba 3.0.28
samba samba 3.0.29
samba samba 3.0.30
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.0.34
samba samba 3.0.35
samba samba 3.0.36
samba samba 3.0.37
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12
samba samba 3.2.13
samba samba 3.2.14
samba samba 3.2.15
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.3.8
samba samba 3.3.9
samba samba 3.3.10
samba samba 3.3.11
samba samba 3.3.12
samba samba 3.3.13
samba samba 3.3.14
samba samba 3.3.15
samba samba 3.3.16
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4
samba samba 3.4.5
samba samba 3.4.6
samba samba 3.4.7
samba samba 3.4.8
samba samba 3.4.9
samba samba 3.4.10
samba samba 3.4.11
samba samba 3.4.12
samba samba 3.4.13
samba samba 3.4.14
samba samba 3.4.15
samba samba 3.4.16
samba samba 3.4.17
samba samba 3.5.0
samba samba 3.5.1
samba samba 3.5.2
samba samba 3.5.3
samba samba 3.5.4
samba samba 3.5.5
samba samba 3.5.6
samba samba 3.5.7
samba samba 3.5.8
samba samba 3.5.9
samba samba 3.5.10
samba samba 3.5.11
samba samba 3.5.12
samba samba 3.5.13
samba samba 3.5.14
samba samba 3.5.15
samba samba 3.5.16
samba samba 3.5.17
samba samba 3.5.18
samba samba 3.5.19
samba samba 3.5.20
samba samba 3.5.21
samba samba 3.5.22
samba samba 3.6.0
samba samba 3.6.1
samba samba 3.6.2
samba samba 3.6.3
samba samba 3.6.4
samba samba 3.6.5
samba samba 3.6.6
samba samba 3.6.7
samba samba 3.6.8
samba samba 3.6.9
samba samba 3.6.10
samba samba 3.6.11
samba samba 3.6.12
samba samba 3.6.13
samba samba 3.6.14
samba samba 3.6.15
samba samba 3.6.16
samba samba 3.6.17
samba samba 3.6.18
samba samba 3.6.19
samba samba 3.6.20
samba samba 3.6.21
samba samba 3.6.22
samba samba 3.6.23
samba samba 3.6.24
samba samba 3.6.25
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.0.11
samba samba 4.0.12
samba samba 4.0.13
samba samba 4.0.14
samba samba 4.0.15
samba samba 4.0.16
samba samba 4.0.17
samba samba 4.0.18
samba samba 4.0.19
samba samba 4.0.20
samba samba 4.0.21
samba samba 4.0.22
samba samba 4.0.23
samba samba 4.0.24
samba samba 4.0.25
samba samba 4.0.26
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.1.6
samba samba 4.1.7
samba samba 4.1.8
samba samba 4.1.9
samba samba 4.1.10
samba samba 4.1.11
samba samba 4.1.12
samba samba 4.1.13
samba samba 4.1.14
samba samba 4.1.15
samba samba 4.1.16
samba samba 4.1.17
samba samba 4.1.18
samba samba 4.1.19
samba samba 4.1.20
samba samba 4.1.21
samba samba 4.1.22
samba samba 4.1.23
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.1
samba samba 4.2.2
samba samba 4.2.3
samba samba 4.2.4
samba samba 4.2.5
samba samba 4.2.6
samba samba 4.2.7
samba samba 4.2.8
samba samba 4.2.9
samba samba 4.3.0
samba samba 4.3.1
samba samba 4.3.2
samba samba 4.3.3
samba samba 4.3.4
samba samba 4.3.5
samba samba 4.3.6
samba samba 4.4.0
canonical ubuntu_linux 14.04
canonical ubuntu_linux 15.10
canonical ubuntu_linux 16.04



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "A8CE218B-E64D-41DC-8CFD-9387427B72CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
              "matchCriteriaId": "9C2CDC66-8A44-4BEE-9574-FC69C38295A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
              "matchCriteriaId": "9AD55F6B-F753-41FC-8701-78A7DA556E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
              "matchCriteriaId": "0B63F362-A49C-401F-BE49-C6E1DC03E4F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
              "matchCriteriaId": "81F23C27-76CF-4906-B829-3B4F2E07900E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
              "matchCriteriaId": "EF6C8992-5210-483E-9EED-B7FC1EACA703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
              "matchCriteriaId": "EAF9C0EA-173A-4B02-9933-09DFAC31398D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "D87FDC2E-C6D9-4D10-BED6-B10C40232DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
              "matchCriteriaId": "A90CE26E-8993-49BA-91BF-536DBC44CAD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
              "matchCriteriaId": "33A9C2ED-355B-4903-ABC3-23C85B494053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
              "matchCriteriaId": "375BCF42-1A8A-4ACB-8198-FEA471A81B76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
              "matchCriteriaId": "C1C6E9D6-2964-4D63-9FCB-B4A02CC21975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
              "matchCriteriaId": "F8C1CA41-DBEF-46D7-9A94-930315BECACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
              "matchCriteriaId": "F6804F20-3B33-4FAA-ACC3-9658FF0770D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
              "matchCriteriaId": "0FFB13DF-53C5-4DF4-8D47-B40BD532E1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
              "matchCriteriaId": "49684CD5-4256-47CA-84BC-E319D8973314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
              "matchCriteriaId": "574ADE47-94CB-42A2-AE8E-A14FBB0EAFB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "254D9460-899D-4D06-AC47-1914A42FC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "427DA06C-9F5C-4E9A-A39F-22CD5E4F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60CED3E-B7A6-4674-ADD5-A3B047C7D125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "07906A18-FD60-42A5-AC17-21F677EA1762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "A99F7DCF-CBD0-4BC1-9C07-F1CB807614BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFC3F99-11F6-496E-BF55-53CF1E012FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C93E46D-FDEA-4B59-8C84-8A3DCC6AB3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4633D2E-2CBE-4B92-AD35-ED57C5399ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F200FC8-DA2E-4D39-8FF7-423759307DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B7341D-B02F-405B-81A0-5F74CFA8F8E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207B352-D8F8-4E15-9507-D3AD10D56211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBA51B-159F-42E9-8A2C-2B9BF1EB7D98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8F01226-D9E6-460C-975A-618932D5F16F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD98764-741C-4FED-BE4D-446E8E8D31F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4048DF8D-628D-4786-A883-0A1865DEBB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E7A4E4-940B-43C4-98A2-70F443A59120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82A06CD-338D-4095-BC7D-2E38050D388A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8C2E40-DA05-4B50-AB29-398AF71EBECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E81ED-032F-42B7-9D50-15CADE337AD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDD90A4-B50B-4640-ADDE-B75BBC34507C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFC3804-991A-4BAF-818E-E321DB21FB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE1B4D9-507A-43B2-81F3-77E411ABEF7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "857FCD47-F720-4273-BF1D-D5DC95ECA6D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8FE4AC-6E71-44CF-902D-BACA830C4CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EE762A-F95F-42CF-BB80-B0EF81A438EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "738095D8-8ACE-4CF4-9D97-4228FC686F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4634FC-DA4E-4B1D-B1AB-A45D8235780D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA83A66-BD39-4560-8EAF-ADF2433EF36D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B1F854-FC98-4DE9-8514-FD52301C5038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "388B4551-AF4C-46D6-840E-D489B05675C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F9D2E0-C795-4A5A-9398-4630B78FCB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D176AD-EA34-4DA2-9926-079438030E74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CF8CA5-0821-49CF-8B8C-2D2D5F63A061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A89C5FB-AA8B-41DC-93D5-81E199D73061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E71E10D0-E7C2-4D14-B685-4FB154B0A865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "05993D31-BC6D-44CD-808C-4A40F998BF0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "5560111D-8930-4B70-BD51-25343FBEED1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "406C2297-B58D-4623-9E7A-2C438ABBAC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6AF0DD4-08D4-4726-8A12-E979FF3322B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F98DE75F-84AD-42EE-B9DA-8AFF22D2BF3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3DAE05B-9086-4702-9586-77B34399E1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA544013-8FAC-4452-9D38-081C514E2981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DE15C9-3308-4DE0-8048-9B06AF4D7343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CB4968-F331-4653-8B9F-75BA4BB7A6D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3470D075-CCF2-42A1-A8C9-E375FC05FF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA72F88-6799-4E6C-B73C-C92616B04661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF17CB71-6E46-4A1E-9EAB-7D2E182D56C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E7FA486-73CE-4226-86C6-DA8383C5578F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17D2B72-19E2-4DE6-B1E3-F1823E2690BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC6922A-03CD-484A-BF40-F8F937428062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "8470C251-2874-4047-A759-F8D5C6D5C755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "332308A1-4BA4-4BC7-8B4B-7463CF98B664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7DEA84-27E5-4CF0-AC2A-B128BB5AE199",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "455B73D1-E8F1-478C-8CEB-79E4B5F33A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC49023-CAD6-4875-BF94-EEC290E8A5A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42BFAF8-5822-4782-B60D-BCB131834419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1FD9EF-A863-48C6-8471-AB1D80B3C1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B8A690-81D0-40C4-9301-CF1992C2DA0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC65AE61-426D-4072-90A1-667AD31B73C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EAFEF2-0FE6-4EE8-B879-79FC24A7F27F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E0C61-7718-4DBC-8F02-6F3C2CBE1783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "324AE9D7-C41F-493E-A1AD-FCD869D29D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "68519B1F-F315-4BBD-A4A3-4E1956D81E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF745E93-A92E-4AD7-8D42-36E9387C6915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4B760-417E-45D1-9CE1-AEBC8936BDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0DA221-078A-49DC-B0F1-F318FD785664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72BCA7B-6338-4A7C-AE71-E0B8F6C9F2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8F6AB9-A6C4-443E-A846-EE845BE24F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C8F7D7-BAAD-4F3A-BA39-44BE0CCADFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC522377-A6CD-4513-83B4-9ADC15F76B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC4595-5699-4237-BCD7-FD233BA1AECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EFCC9DB-4AA9-460E-87F0-1F74DEBB104B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FAC8F1-CB72-4DBD-9746-372246BEFEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44BD172-80FA-4260-BAFB-251A95E8C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09116D2-F168-4305-9A1D-88A1D42739A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "558E0B71-F79E-47B5-90CC-9C165BB15507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D7E102-DD54-43F2-B008-66F7C243477E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8066AB8C-1AE6-4DA3-91DB-4BF67DBBA279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A03CB9E-DEFC-4507-A314-5E0824A66462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6708D6E-2098-432D-820A-853032BD9A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "42BA346B-F7C6-4EB3-91BD-2CCC2B688AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B689AA-2074-4E9A-93BD-F910510A29AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF22E49-B259-4E13-B371-0C0173E534FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE5C0A8F-A502-4BC1-AC8A-45AE1D16371D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73876B7-A758-40CB-919D-6720AA7B9564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "84925F68-F440-4677-B3DF-F87EAC39E235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC0A0B3C-C011-4F27-BE8D-5A89BFC93F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7792A65-DB6E-49F4-9447-021EA9A82697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF3B982-B094-4B54-84A2-4CA199EE4E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6811F5-DDCA-4AED-9BF9-4C71550A727D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF1670DE-C3B6-4EA3-8132-66BBD4CEFAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AE10A1EF-F9CE-4126-9793-FB70A1D512A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7FA4DD6C-1531-420A-B271-EB16EA05470B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "AB6AEA9D-42C8-4C60-86AE-54DB2940A3B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2F221BF0-7B2B-4676-B8F2-2705C05B4034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C395C0-160C-4D8A-A3B6-7E30DD8721EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17EC5DF-2F00-479B-9775-45DA569BCED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CC31CBA-10A4-417C-A381-2BB7A68CE0D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D07800-4CCD-4B98-8D41-778295D1A3A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C4D3BA-781F-4C96-9234-73DB1593C7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AACDFB6-841E-42A5-AA8D-58E8A38D11D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD43D2C5-26D5-41AC-BC20-FACB68D22F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D186867E-18D6-4960-B8BE-A4353D941357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "23DAAAEB-EB1E-4BCD-B88E-33418E3FD1DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8643B45-1CE3-492F-BD82-65801F6C6FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F009D18-204C-4E6D-9827-9FBA9A4FFBA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "158DC9D2-2264-48B6-9116-CE6F0138D7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4339B46-E92A-4F7C-A0BA-62D7F7C428DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3D5E50-874B-48AE-B7C0-264DA0531847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "60C0F5A3-DB13-4BAC-B633-7E7F54FE34FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E28BFB7-FB1A-455E-BE0B-ADDEBFA9B9B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A0453F7-380D-4F29-9B54-D47AAAD9FFE6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n de autenticaci\u00f3n NTLMSSP en Samba 3.x y 4.x en versiones anteriores a 4.2.11, 4.3.x en versiones anteriores a 4.3.8 y 4.4.x en versiones anteriores a 4.4.2 permite a atacantes man-in-the-middle llevar a cabo ataques de degradaci\u00f3n de protocolo modificando el flujo de datos cliente-servidor para eliminar indicadores de la capa de aplicaci\u00f3n o ajustes de cifrado, seg\u00fan lo demostrado limpiando la opci\u00f3n NTLMSSP_NEGOTIATE_SEAL o NTLMSSP_NEGOTIATE_SIGN para interrumpir la seguridad LDAP."
    }
  ],
  "id": "CVE-2016-2110",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-25T00:59:01.113",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://badlock.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2016/dsa-3548"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1035533"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bto.bluecoat.com/security-advisory/sa122"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2110.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://badlock.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2016-05/msg00124.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bto.bluecoat.com/security-advisory/sa122"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2110.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-254"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-28 04:58
Modified
2025-04-12 10:46
Severity ?
Summary
Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2014-0279.htmlThird Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/59378Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/59407Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/59579Third Party Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201502-15.xmlThird Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2014:136Third Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:082Broken Link
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2014-0178Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/532757/100/0/threadedThird Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/bid/67686Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1030308Third Party Advisory, VDB Entry
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2014-0279.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59378Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59407Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59579Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201502-15.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2014:136Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:082Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2014-0178Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/532757/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/67686Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1030308Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993Third Party Advisory
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.1.6
samba samba 4.1.7
samba samba 3.6.6
samba samba 3.6.7
samba samba 3.6.8
samba samba 3.6.9
samba samba 3.6.10
samba samba 3.6.11
samba samba 3.6.12
samba samba 3.6.13
samba samba 3.6.14
samba samba 3.6.15
samba samba 3.6.16
samba samba 3.6.17
samba samba 3.6.18
samba samba 3.6.19
samba samba 3.6.20
samba samba 3.6.21
samba samba 3.6.22
samba samba 3.6.23



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "18EF9944-C42C-482C-BB17-D2715A2ADCAF",
              "versionEndExcluding": "3.6.25",
              "versionStartIncluding": "3.6.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49235CF9-9463-4408-9747-C37CE719E437",
              "versionEndExcluding": "4.0.18",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC0F01F-2023-47CE-9661-A8E2A0FD4E92",
              "versionEndExcluding": "4.1.8",
              "versionStartIncluding": "4.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44BD172-80FA-4260-BAFB-251A95E8C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09116D2-F168-4305-9A1D-88A1D42739A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3DAE05B-9086-4702-9586-77B34399E1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA544013-8FAC-4452-9D38-081C514E2981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DE15C9-3308-4DE0-8048-9B06AF4D7343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CB4968-F331-4653-8B9F-75BA4BB7A6D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3470D075-CCF2-42A1-A8C9-E375FC05FF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA72F88-6799-4E6C-B73C-C92616B04661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF17CB71-6E46-4A1E-9EAB-7D2E182D56C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E7FA486-73CE-4226-86C6-DA8383C5578F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17D2B72-19E2-4DE6-B1E3-F1823E2690BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC6922A-03CD-484A-BF40-F8F937428062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "8470C251-2874-4047-A759-F8D5C6D5C755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "332308A1-4BA4-4BC7-8B4B-7463CF98B664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7DEA84-27E5-4CF0-AC2A-B128BB5AE199",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "455B73D1-E8F1-478C-8CEB-79E4B5F33A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC49023-CAD6-4875-BF94-EEC290E8A5A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42BFAF8-5822-4782-B60D-BCB131834419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1FD9EF-A863-48C6-8471-AB1D80B3C1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B8A690-81D0-40C4-9301-CF1992C2DA0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 3.6.6 through 3.6.23, 4.0.x before 4.0.18, and 4.1.x before 4.1.8, when a certain vfs shadow copy configuration is enabled, does not properly initialize the SRV_SNAPSHOT_ARRAY response field, which allows remote authenticated users to obtain potentially sensitive information from process memory via a (1) FSCTL_GET_SHADOW_COPY_DATA or (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS request."
    },
    {
      "lang": "es",
      "value": "Samba 3.6.6 hasta 3.6.23, 4.0.x anterior a 4.0.18 y 4.1.x anterior a 4.1.8, cuando cierta configuraci\u00f3n de copia shadow vfs est\u00e1 habilitada, no inicializa debidamente el campo de respuesta SRV_SNAPSHOT_ARRAY, lo que permite a usuarios remotos autenticados obtener informaci\u00f3n potencialmente sensible de la memoria de procesos a trav\u00e9s de una solicitud (1) FSCTL_GET_SHADOW_COPY_DATA o (2) FSCTL_SRV_ENUMERATE_SNAPSHOTS."
    }
  ],
  "id": "CVE-2014-0178",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-28T04:58:32.690",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://advisories.mageia.org/MGASA-2014-0279.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/59378"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/59407"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/59579"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2014-0178"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/67686"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1030308"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://advisories.mageia.org/MGASA-2014-0279.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/59378"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/59407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/59579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2014-0178"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/67686"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1030308"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-18 18:15
Modified
2024-11-21 05:18
Summary
Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90E25F32-0EA6-4663-8031-D7473716820A",
              "versionEndExcluding": "4.13.14",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BD5F53-14DC-4BBF-8E5D-A1DBD24B5F02",
              "versionEndExcluding": "4.14.10",
              "versionStartIncluding": "4.14.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F33C9B3-33EE-431B-93CF-B738D05BBD0A",
              "versionEndExcluding": "4.15.2",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EF1C1CC-3FAE-4DE3-BC41-E5B14D5721F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE4D2D0-CEEB-416F-8BC5-A7987DF56190",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple flaws were found in the way samba AD DC implemented access and conformance checking of stored data. An attacker could use this flaw to cause total domain compromise."
    },
    {
      "lang": "es",
      "value": "Se han encontrado m\u00faltiples fallos en la forma en que samba AD DC implementa el acceso y la comprobaci\u00f3n de conformidad de los datos almacenados. Un atacante podr\u00eda usar este fallo para causar un compromiso total del dominio"
    }
  ],
  "id": "CVE-2020-25722",
  "lastModified": "2024-11-21T05:18:34.627",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-18T18:15:08.643",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019764"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-25722.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019764"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-25722.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-23 16:15
Modified
2024-11-21 05:46
Summary
A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96835C03-A649-4975-B6DE-9E6A1F24D397",
              "versionEndExcluding": "4.15.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB28F9AF-3D06-4532-B397-96D7E4792503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CA4F12A-5BC5-4D75-8F20-80D8BB2C5BF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C3741B8-851F-475D-B428-523F4F722350",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C237415F-33FE-4686-9B19-A0916BF75D2D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in the way Samba handled file/directory metadata. This flaw allows an authenticated attacker with permissions to read or modify share metadata, to perform this operation outside of the share."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo en la forma en que Samba maneja los metadatos de los archivos/directorios. Este fallo permite a un atacante autenticado con permisos para leer o modificar los metadatos del recurso compartido, llevar a cabo esta operaci\u00f3n fuera del recurso compartido."
    }
  ],
  "id": "CVE-2021-20316",
  "lastModified": "2024-11-21T05:46:21.793",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-23T16:15:09.147",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2021-20316"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009673"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14842"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2021-20316"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2021-20316.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2021-20316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009673"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://security-tracker.debian.org/tracker/CVE-2021-20316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2021-20316.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-28 14:29
Modified
2024-11-21 03:53
Summary
Samba from version 4.7.0 has a vulnerability that allows a user in a Samba AD domain to crash the KDC when Samba is built in the non-default MIT Kerberos configuration. With this advisory the Samba Team clarify that the MIT Kerberos build of the Samba AD DC is considered experimental. Therefore the Samba Team will not issue security patches for this configuration. Additionally, Samba 4.7.12, 4.8.7 and 4.9.3 have been issued as security releases to prevent building of the AD DC with MIT Kerberos unless --with-experimental-mit-ad-dc is specified to the configure command.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8006E4C0-DEF2-4C54-A099-FA5453529D01",
              "versionEndExcluding": "4.7.12",
              "versionStartIncluding": "4.7.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "952E46DC-D32E-4695-B835-19D07898713A",
              "versionEndExcluding": "4.8.7",
              "versionStartIncluding": "4.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6711DD48-1D71-4F14-A071-8A3F08D84162",
              "versionEndExcluding": "4.9.3",
              "versionStartIncluding": "4.9.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba from version 4.7.0 has a vulnerability that allows a user in a Samba AD domain to crash the KDC when Samba is built in the non-default MIT Kerberos configuration. With this advisory the Samba Team clarify that the MIT Kerberos build of the Samba AD DC is considered experimental. Therefore the Samba Team will not issue security patches for this configuration. Additionally, Samba 4.7.12, 4.8.7 and 4.9.3 have been issued as security releases to prevent building of the AD DC with MIT Kerberos unless --with-experimental-mit-ad-dc is specified to the configure command."
    },
    {
      "lang": "es",
      "value": "Samba, desde la versi\u00f3n 4.7.0, tiene una vulnerabilidad que permite que un usuario en el dominio Samba AD provoque el cierre inesperado del KDC cuando Samba se incluye en la configuraci\u00f3n de MIT Kerberos que no es la predeterminada. Con este advisory, el equipo de Samba aclara que la build MIT Kerberos de Samba AC DC se considera experimental. Por lo tanto, el equipo de Samba no publicar\u00e1 parches de seguridad para esta configuraci\u00f3n. Adem\u00e1s, Samba 4.7.12, 4.8.7 y 4.9.3 se han publicado como versiones de seguridad para evitar que se incluya AD DC con MIT Kerberos, a menos que --with-experimental-mit-ad-dc se especifique en el comando configure."
    }
  ],
  "id": "CVE-2018-16853",
  "lastModified": "2024-11-21T03:53:27.007",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-28T14:29:00.533",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106026"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16853"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20181127-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-16853.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106026"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16853"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20181127-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-16853.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple memory leaks in Samba before 3.0.6 allow attackers to cause a denial of service (memory consumption).
Impacted products
Vendor Product Version
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 2.0
samba samba 2.0.0
samba samba 2.0.5a
samba samba 2.2.1
samba samba 2.2.1a
samba samba 2.2.3a
samba samba 2.2.7a
samba samba 2.2.8a
samba samba 2.2.9
samba samba 2.2.10
samba samba 2.2.11
samba samba 2.2.12
samba samba 2.2a
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
trustix secure_linux 2.0
trustix secure_linux 2.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B50D9E-EA43-44BF-9176-610EC808B986",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p1:*:*:*:*:*:*",
              "matchCriteriaId": "BCBBF662-40C3-4280-BE79-9D7C36A6DF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p3:*:*:*:*:*:*",
              "matchCriteriaId": "BDD6A6AE-C636-4131-807B-59F7784B7AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8C6D63F5-B72C-445A-BC61-D52D6022481B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p5:*:*:*:*:*:*",
              "matchCriteriaId": "1ADD724A-1747-4678-A659-0A528B728C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p1:*:*:*:*:*:*",
              "matchCriteriaId": "A3ABEA3A-8F88-4947-80A5-CF1459F5AC8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p10:*:*:*:*:*:*",
              "matchCriteriaId": "86F85E94-9F94-457A-A606-35DB558484A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p2:*:*:*:*:*:*",
              "matchCriteriaId": "1ED4704B-2422-43C9-A2E0-9851F56D4CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p3:*:*:*:*:*:*",
              "matchCriteriaId": "158D175A-E0D7-45EF-BDD2-D86F2E8F7766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p4:*:*:*:*:*:*",
              "matchCriteriaId": "7854FCEF-D1F8-4DEC-A6CB-C4470899F71C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p5:*:*:*:*:*:*",
              "matchCriteriaId": "36D8B675-C209-4D5A-8EA7-1B3515E930FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p6:*:*:*:*:*:*",
              "matchCriteriaId": "4BCECF31-4C73-4ABA-9F84-D5DBA1DB1F50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p7:*:*:*:*:*:*",
              "matchCriteriaId": "2C5A1382-D147-43E5-8DB7-93B7A3B9AA0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p8:*:*:*:*:*:*",
              "matchCriteriaId": "3A497A5D-96FC-490E-87EB-94C1BE7338A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "245628A9-A5DC-403F-A781-7A066E9ECC78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F681E4CC-B8D3-48A2-B93E-0363B22B059E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDD0125-4C47-404A-9DC0-2E923C66B4D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCACECDD-40F1-4A9B-8B8A-20565FEE3627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F65FF3-71F8-4278-A823-A6E0FF65D9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "614547F5-9C3F-489B-9B72-91B0FF646CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DC3500-F8F0-46E1-B0AA-C2474CCB3DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "75C86202-3150-440C-B048-BB039E9D3606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CAF474-0C3A-4E49-8CF8-9DF14D84CDCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3ABF97-93A2-48C3-898E-9DADD5614BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92304DE-CFBB-4C03-AA7F-54DB3C14ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "04F39AA5-9048-4EE9-B0F2-CE679C673F0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC2AE5A9-62C5-4DCE-85B3-16F48695B3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple memory leaks in Samba before 3.0.6 allow attackers to cause a denial of service (memory consumption)."
    }
  ],
  "id": "CVE-2004-2546",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.samba.org/samba/history/samba-3.0.6.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2004/0043"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/history/samba-3.0.6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2004/0043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17139"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable.  This issue did not affect the versions of Samba as distributed with Red Hat Enterprise Linux 3, or 4.  Red Hat Enterprise Linux 2.1 shipped with a version of Samba prior to 3.0.6, but we verified by code audit that it is not affected by this issue.",
      "lastModified": "2006-08-30T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-01-17 02:59
Modified
2025-04-12 10:46
Severity ?
Summary
Samba 4.0.x before 4.0.24, 4.1.x before 4.1.16, and 4.2.x before 4.2rc4, when an Active Directory Domain Controller (AD DC) is configured, allows remote authenticated users to set the LDB userAccountControl UF_SERVER_TRUST_ACCOUNT bit, and consequently gain privileges, by leveraging delegation of authority for user-account or computer-account creation.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
secalert@redhat.comhttp://secunia.com/advisories/62594
secalert@redhat.comhttp://www.securityfocus.com/bid/72278
secalert@redhat.comhttp://www.securitytracker.com/id/1031615
secalert@redhat.comhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.416326
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2481-1
secalert@redhat.comhttps://download.samba.org/pub/samba/patches/security/samba-4.0.23-CVE-2014-8143.patchPatch
secalert@redhat.comhttps://download.samba.org/pub/samba/patches/security/samba-4.1.15-CVE-2014-8143.patchPatch
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/100596
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2014-8143Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/62594
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/72278
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1031615
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.416326
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2481-1
af854a3a-2127-422b-91ae-364da2661108https://download.samba.org/pub/samba/patches/security/samba-4.0.23-CVE-2014-8143.patchPatch
af854a3a-2127-422b-91ae-364da2661108https://download.samba.org/pub/samba/patches/security/samba-4.1.15-CVE-2014-8143.patchPatch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/100596
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2014-8143Patch, Vendor Advisory
Impacted products
Vendor Product Version
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.0.11
samba samba 4.0.12
samba samba 4.0.13
samba samba 4.0.14
samba samba 4.0.15
samba samba 4.0.16
samba samba 4.0.17
samba samba 4.0.18
samba samba 4.0.19
samba samba 4.0.20
samba samba 4.0.21
samba samba 4.0.22
samba samba 4.0.23
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.1.6
samba samba 4.1.7
samba samba 4.1.8
samba samba 4.1.9
samba samba 4.1.10
samba samba 4.1.11
samba samba 4.1.12
samba samba 4.1.13
samba samba 4.1.14
samba samba 4.1.15
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E0C61-7718-4DBC-8F02-6F3C2CBE1783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "324AE9D7-C41F-493E-A1AD-FCD869D29D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "68519B1F-F315-4BBD-A4A3-4E1956D81E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF745E93-A92E-4AD7-8D42-36E9387C6915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4B760-417E-45D1-9CE1-AEBC8936BDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0DA221-078A-49DC-B0F1-F318FD785664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72BCA7B-6338-4A7C-AE71-E0B8F6C9F2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8F6AB9-A6C4-443E-A846-EE845BE24F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C8F7D7-BAAD-4F3A-BA39-44BE0CCADFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC522377-A6CD-4513-83B4-9ADC15F76B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44BD172-80FA-4260-BAFB-251A95E8C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09116D2-F168-4305-9A1D-88A1D42739A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "558E0B71-F79E-47B5-90CC-9C165BB15507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D7E102-DD54-43F2-B008-66F7C243477E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8066AB8C-1AE6-4DA3-91DB-4BF67DBBA279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A03CB9E-DEFC-4507-A314-5E0824A66462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6708D6E-2098-432D-820A-853032BD9A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "42BA346B-F7C6-4EB3-91BD-2CCC2B688AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B689AA-2074-4E9A-93BD-F910510A29AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF22E49-B259-4E13-B371-0C0173E534FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AE10A1EF-F9CE-4126-9793-FB70A1D512A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7FA4DD6C-1531-420A-B271-EB16EA05470B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "AB6AEA9D-42C8-4C60-86AE-54DB2940A3B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 4.0.x before 4.0.24, 4.1.x before 4.1.16, and 4.2.x before 4.2rc4, when an Active Directory Domain Controller (AD DC) is configured, allows remote authenticated users to set the LDB userAccountControl UF_SERVER_TRUST_ACCOUNT bit, and consequently gain privileges, by leveraging delegation of authority for user-account or computer-account creation."
    },
    {
      "lang": "es",
      "value": "Samba 4.0.x anterior a 4.0.24, 4.1.x anterior a 4.1.16, y 4.2.x anterior a 4.2rc4, cuando un Active Directory Domain Controller (AD DC) est\u00e1 configurado, permite a usuarios remotos autenticados configurar el bit de LDB userAccountControl UF_SERVER_TRUST_ACCOUNT, y como consecuencia ganar privilegios, mediante el aprovechamiento de la delegaci\u00f3n de autoridad para la creaci\u00f3n de cuentas de usuarios o cuentas de ordenadores."
    }
  ],
  "id": "CVE-2014-8143",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.5,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-01-17T02:59:03.617",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/62594"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/72278"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1031615"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.416326"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2481-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://download.samba.org/pub/samba/patches/security/samba-4.0.23-CVE-2014-8143.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://download.samba.org/pub/samba/patches/security/samba-4.1.15-CVE-2014-8143.patch"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100596"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2014-8143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00031.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/62594"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/72278"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1031615"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2015\u0026m=slackware-security.416326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2481-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://download.samba.org/pub/samba/patches/security/samba-4.0.23-CVE-2014-8143.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://download.samba.org/pub/samba/patches/security/samba-4.1.15-CVE-2014-8143.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100596"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2014-8143"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-07 14:15
Modified
2024-11-21 04:55
Summary
A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1849491%3B
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2020/11/msg00041.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/
secalert@redhat.comhttps://security.gentoo.org/glsa/202007-15Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2020-10745.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1849491%3B
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/11/msg00041.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202007-15Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2020-10745.htmlVendor Advisory
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
fedoraproject fedora 31
opensuse leap 15.1
opensuse leap 15.2
debian debian_linux 9.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F531D43-B790-4531-B11B-9234C307F0E9",
              "versionEndExcluding": "4.10.17",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE656EC4-DE4C-4921-A22D-88C9CEDFFECB",
              "versionEndExcluding": "4.11.11",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D8FF3AF-B703-4021-8156-3D767FA10B8E",
              "versionEndExcluding": "4.12.4",
              "versionStartIncluding": "4.12.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4 in the way it processed NetBios over TCP/IP. This flaw allows a remote attacker could to cause the Samba server to consume excessive CPU use, resulting in a denial of service. This highest threat from this vulnerability is to system availability."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo en todas las versiones de Samba anteriores a 4.10.17, anteriores a 4.11.11 y anteriores a 4.12.4 en la manera en que procesaba NetBios sobre TCP/IP. Este fallo permite a un atacante remoto poder causar que el servidor Samba consuma un uso excesivo de la CPU, resultando en una denegaci\u00f3n de servicio. La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema"
    }
  ],
  "id": "CVE-2020-10745",
  "lastModified": "2024-11-21T04:55:58.893",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-07T14:15:11.007",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849491%3B"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202007-15"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-10745.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849491%3B"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202007-15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-10745.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-17 19:15
Modified
2025-03-07 15:52
Summary
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020). When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
References
secure@microsoft.comhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.htmlMailing List, Third Party Advisory
secure@microsoft.comhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.htmlMailing List, Third Party Advisory
secure@microsoft.comhttp://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.htmlThird Party Advisory, VDB Entry
secure@microsoft.comhttp://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.htmlExploit, Third Party Advisory, VDB Entry
secure@microsoft.comhttp://www.openwall.com/lists/oss-security/2020/09/17/2Mailing List, Third Party Advisory
secure@microsoft.comhttps://lists.debian.org/debian-lts-announce/2020/11/msg00041.htmlMailing List, Third Party Advisory
secure@microsoft.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/Mailing List, Third Party Advisory
secure@microsoft.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/Mailing List, Third Party Advisory
secure@microsoft.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/Mailing List, Third Party Advisory
secure@microsoft.comhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472Patch, Vendor Advisory
secure@microsoft.comhttps://security.gentoo.org/glsa/202012-24Third Party Advisory
secure@microsoft.comhttps://usn.ubuntu.com/4510-1/Third Party Advisory
secure@microsoft.comhttps://usn.ubuntu.com/4510-2/Third Party Advisory
secure@microsoft.comhttps://usn.ubuntu.com/4559-1/Third Party Advisory
secure@microsoft.comhttps://www.kb.cert.org/vuls/id/490028Third Party Advisory, US Government Resource
secure@microsoft.comhttps://www.oracle.com/security-alerts/cpuApr2021.htmlPatch, Third Party Advisory
secure@microsoft.comhttps://www.synology.com/security/advisory/Synology_SA_20_21Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2020/09/17/2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/11/msg00041.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202012-24Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4510-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4510-2/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4559-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/490028Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.oracle.com/security-alerts/cpuApr2021.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/security/advisory/Synology_SA_20_21Third Party Advisory



{
  "cisaActionDue": "2020-09-21",
  "cisaExploitAdd": "2021-11-03",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Microsoft Netlogon Privilege Escalation Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A5713AE-B7C5-4599-8E4F-9C235E73E5F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DA2F119-5266-4D1E-9C3C-86C55C99DD7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2004:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62224791-644C-4D1F-AD77-56B16CF27630",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
              "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F9B6B1-4FEE-4D4B-B35F-B07822CCD669",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:synology:directory_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DFEE540-C75F-438F-9570-82323D631855",
              "versionEndExcluding": "4.4.5-0101",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9079D103-CA66-4325-B93F-B3F049227B15",
              "versionEndExcluding": "4.10.18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0360B7-001C-4F5B-B222-8DEBF8753E62",
              "versionEndExcluding": "4.11.13",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3DB255A-E101-4FB5-A54A-BCB12781B74E",
              "versionEndExcluding": "4.12.7",
              "versionStartIncluding": "4.12.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3E503FB-6279-4D4A-91D8-E237ECF9D2B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.\nTo exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access.\nMicrosoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels.\nFor guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see  How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020).\nWhen the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.\n"
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de elevaci\u00f3n de privilegios cuando un atacante establece una conexi\u00f3n de canal seguro Netlogon vulnerable hacia un controlador de dominio, usando el Netlogon Remote Protocol (MS-NRPC), tambi\u00e9n se conoce como \"Netlogon Elevation of Privilege Vulnerability\"."
    }
  ],
  "id": "CVE-2020-1472",
  "lastModified": "2025-03-07T15:52:30.803",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "secure@microsoft.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 10.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Secondary"
      }
    ]
  },
  "published": "2020-08-17T19:15:15.117",
  "references": [
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2020/09/17/2"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202012-24"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4510-1/"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4510-2/"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4559-1/"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.kb.cert.org/vuls/id/490028"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
    },
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_20_21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2020/09/17/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202012-24"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4510-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4510-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4559-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.kb.cert.org/vuls/id/490028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.oracle.com/security-alerts/cpuApr2021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_20_21"
    }
  ],
  "sourceIdentifier": "secure@microsoft.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-14 21:19
Modified
2025-04-09 00:30
Severity ?
Summary
The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the "username map script" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management.
References
secalert@redhat.comhttp://docs.info.apple.com/article.html?artnum=306172
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
secalert@redhat.comhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534
secalert@redhat.comhttp://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
secalert@redhat.comhttp://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
secalert@redhat.comhttp://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
secalert@redhat.comhttp://secunia.com/advisories/25232Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25241Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25246Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25251Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25255Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25256Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25257Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25259Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25270Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/25289
secalert@redhat.comhttp://secunia.com/advisories/25567
secalert@redhat.comhttp://secunia.com/advisories/25675
secalert@redhat.comhttp://secunia.com/advisories/25772
secalert@redhat.comhttp://secunia.com/advisories/26083
secalert@redhat.comhttp://secunia.com/advisories/26235
secalert@redhat.comhttp://secunia.com/advisories/26909
secalert@redhat.comhttp://secunia.com/advisories/27706
secalert@redhat.comhttp://secunia.com/advisories/28292
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200705-15.xml
secalert@redhat.comhttp://securityreason.com/securityalert/2700
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1291
secalert@redhat.comhttp://www.kb.cert.org/vuls/id/268336US Government Resource
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:104
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2007_14_sr.html
secalert@redhat.comhttp://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
secalert@redhat.comhttp://www.osvdb.org/34700
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0354.html
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2007-2447.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/468565/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/468670/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/23972
secalert@redhat.comhttp://www.securityfocus.com/bid/25159
secalert@redhat.comhttp://www.securitytracker.com/id?1018051
secalert@redhat.comhttp://www.trustix.org/errata/2007/0017/
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-460-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1805
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2079
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2210
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2281
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2732
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/3229
secalert@redhat.comhttp://www.vupen.com/english/advisories/2008/0050
secalert@redhat.comhttp://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-1366
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10062
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=306172
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01067768
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980
af854a3a-2127-422b-91ae-364da2661108http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25232Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25241Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25246Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25251Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25255Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25256Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25257Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25259Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25270Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25289
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25567
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25675
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25772
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26083
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26235
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26909
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27706
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28292
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200705-15.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/2700
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1291
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/268336US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:104
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_14_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/34700
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0354.html
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2007-2447.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/468565/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/468670/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23972
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25159
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018051
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0017/
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-460-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1805
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2079
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2210
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2281
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2732
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3229
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0050
af854a3a-2127-422b-91ae-364da2661108http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1366
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10062
Impacted products
Vendor Product Version
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote attackers to execute arbitrary commands via shell metacharacters involving the (1) SamrChangePassword function, when the \"username map script\" smb.conf option is enabled, and allows remote authenticated users to execute commands via shell metacharacters involving other MS-RPC functions in the (2) remote printer and (3) file share management."
    },
    {
      "lang": "es",
      "value": "La funcionalidad MS-RPC en mbd en Samba 3.0.0 hasta la 3.0.25rc3 permite a atacantes remotos ejecutar comandos de su elecci\u00f3n a trav\u00e9s del int\u00e9rprete de comandos (shell) de metacaracteres afectando a la (1) funci\u00f3n SamrChangePassword, cuando la opci\u00f3n \"secuencia de comandos del mapa del nombre de usuario\" smb.conf est\u00e1 activada, y permite a usuarios remotos validados ejecutar comandos a trav\u00e9s del int\u00e9rprete de comandos (shell) de metacaracteres afectando a otras funciones MS-RPC en la (2)impresora remota y (3)gesti\u00f3n de ficheros compartidos."
    }
  ],
  "id": "CVE-2007-2447",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-14T21:19:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://docs.info.apple.com/article.html?artnum=306172"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25232"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25241"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25246"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25251"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25255"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25256"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25257"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25259"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25270"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/25289"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/25567"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/25675"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/25772"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26083"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26235"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26909"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/27706"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/28292"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securityreason.com/securityalert/2700"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2007/dsa-1291"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/268336"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/34700"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0354.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2007-2447.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/468565/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/23972"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/25159"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1018051"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.trustix.org/errata/2007/0017/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-460-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/1805"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/2079"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/2210"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/2281"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/2732"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/3229"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2008/0050"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-1366"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10062"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=306172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01067768"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=534"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2007-September/065902.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25246"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25255"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25289"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25567"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25675"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25772"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26235"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28292"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2700"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1291"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/268336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_14_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/34700"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0354.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2007-2447.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/468565/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23972"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/25159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018051"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0017/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-460-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1805"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2079"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2281"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0050"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.xerox.com/downloads/usa/en/c/cert_XRX08_001.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1366"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10062"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-09-13 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop.
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873Patch, Vendor Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=109509335230495&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=109526231623307&w=2
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200409-16.xmlPatch, Vendor Advisory
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=139&type=vulnerabilitiesPatch, Vendor Advisory
cve@mitre.orghttp://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-467.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.trustix.net/errata/2004/0046/Patch, Vendor Advisory
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=109509335230495&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=109526231623307&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200409-16.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=139&type=vulnerabilitiesPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-467.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.net/errata/2004/0046/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141
Impacted products
Vendor Product Version
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
sgi samba 3.0
sgi samba 3.0.1
sgi samba 3.0.2
sgi samba 3.0.3
sgi samba 3.0.4
sgi samba 3.0.5
sgi samba 3.0.6
conectiva linux 9.0
conectiva linux 10.0
mandrakesoft mandrake_linux 10.0
mandrakesoft mandrake_linux 10.0
suse suse_linux 8
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sgi:samba:3.0:*:irix:*:*:*:*:*",
              "matchCriteriaId": "F23093A1-6B11-4116-99C9-A5C6FA4A4B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sgi:samba:3.0.1:*:irix:*:*:*:*:*",
              "matchCriteriaId": "3183B6F2-C3EB-4C9D-8489-DA1159480992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sgi:samba:3.0.2:*:irix:*:*:*:*:*",
              "matchCriteriaId": "051BA8CA-86BD-45BF-93D6-D85E8FB5D46F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sgi:samba:3.0.3:*:irix:*:*:*:*:*",
              "matchCriteriaId": "630FE403-9714-4949-9419-40F748638657",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sgi:samba:3.0.4:*:irix:*:*:*:*:*",
              "matchCriteriaId": "17EE6A8B-6C32-40B4-81F7-070A51178D32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sgi:samba:3.0.5:*:irix:*:*:*:*:*",
              "matchCriteriaId": "9080B59D-3E86-4731-9453-EF1E27451245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sgi:samba:3.0.6:*:irix:*:*:*:*:*",
              "matchCriteriaId": "C69C662B-E08D-44BD-9793-8304426F071F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4007B0D-9606-46BD-866A-7911BEA292BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A35FC777-A34E-4C7B-9E93-8F17F3AD5180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*",
              "matchCriteriaId": "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "D2E2EF3C-1379-4CBE-8FF5-DACD47834651",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8C55338-3372-413F-82E3-E1B476D6F41A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "F7446746-87B7-4BD3-AABF-1E0FAA8265AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "56EF103F-5668-4754-A83B-D3662D0CE815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 3.0.6 and earlier allows remote attackers to cause a denial of service (infinite loop and memory exhaustion) via certain malformed requests that cause new processes to be spawned and enter an infinite loop."
    }
  ],
  "id": "CVE-2004-0807",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-09-13T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=109509335230495\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=109526231623307\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=139\u0026type=vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-467.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.trustix.net/errata/2004/0046/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20041201-01-P"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=109509335230495\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=109526231623307\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=139\u0026type=vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-467.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.trustix.net/errata/2004/0046/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11141"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-21 18:15
Modified
2025-01-14 19:29
Summary
There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.htmlThird Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19344Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/
secalert@redhat.comhttps://security.gentoo.org/glsa/202003-52
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20200122-0001/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/4244-1/Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2019-19344.htmlVendor Advisory
secalert@redhat.comhttps://www.synology.com/security/advisory/Synology_SA_20_01Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19344Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202003-52
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200122-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4244-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2019-19344.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/security/advisory/Synology_SA_20_01Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90EC6BC6-BE25-4A68-852D-B58BCA1A6624",
              "versionEndExcluding": "4.9.18",
              "versionStartIncluding": "4.9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7487A1D-2694-41FC-895C-4679A6595EBE",
              "versionEndExcluding": "4.10.12",
              "versionStartIncluding": "4.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B316BA8C-6822-49AA-8198-52E779B717DF",
              "versionEndExcluding": "4.11.5",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:synology:directory_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83512426-0B96-43E2-AFBA-592B25E61676",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F6D2BF-23EA-4D44-8126-64EA85184D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C997777-BE79-4F77-90D7-E1A71D474D88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9685B12-824F-42AD-B87C-6E7A78BB7FA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a use-after-free issue in all samba 4.9.x versions before 4.9.18, all samba 4.10.x versions before 4.10.12 and all samba 4.11.x versions before 4.11.5, essentially due to a call to realloc() while other local variables still point at the original buffer."
    },
    {
      "lang": "es",
      "value": "Se presenta un problema de uso de la memoria previamente liberada en todas las versiones 4.9.x anteriores a 4.9.18 de samba, todas las versiones 4.10.x anteriores a 4.10.12 de samba y todas las versiones 4.11.x anteriores a 4.11.5 de samba, esencialmente debido a una llamada a la funci\u00f3n realloc() mientras que otras variables locales a\u00fan apuntan al b\u00fafer original."
    }
  ],
  "id": "CVE-2019-19344",
  "lastModified": "2025-01-14T19:29:55.853",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-21T18:15:12.937",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19344"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200122-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4244-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-19344.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_20_01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-19344"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200122-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4244-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-19344.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_20_01"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873Patch
cve@mitre.orghttp://marc.info/?l=bugtraq&m=109509335230495&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=109526231623307&w=2
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200409-16.xmlPatch, Vendor Advisory
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=138&type=vulnerabilitiesPatch, Vendor Advisory
cve@mitre.orghttp://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-467.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.trustix.net/errata/2004/0046/Patch, Vendor Advisory
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873Patch
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=109509335230495&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=109526231623307&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200409-16.xmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=138&type=vulnerabilitiesPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-467.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.net/errata/2004/0046/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344
Impacted products
Vendor Product Version
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The process_logon_packet function in the nmbd server for Samba 3.0.6 and earlier, when domain logons are enabled, allows remote attackers to cause a denial of service via a SAM_UAS_CHANGE request with a length value that is larger than the number of structures that are provided."
    }
  ],
  "id": "CVE-2004-0808",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=109509335230495\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=109526231623307\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=138\u0026type=vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-467.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.trustix.net/errata/2004/0046/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=109509335230495\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=109526231623307\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-16.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=138\u0026type=vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-467.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.trustix.net/errata/2004/0046/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10344"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-28 14:29
Modified
2024-11-21 03:49
Summary
A denial of service vulnerability was discovered in Samba's LDAP server before versions 4.7.12, 4.8.7, and 4.9.3. A CNAME loop could lead to infinite recursion in the server. An unprivileged local attacker could create such an entry, leading to denial of service.
References
secalert@redhat.comhttp://www.securityfocus.com/bid/106022Third Party Advisory, VDB Entry
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14629Exploit, Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2018/12/msg00005.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/202003-52
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20181127-0001/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/3827-1/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/3827-2/Third Party Advisory
secalert@redhat.comhttps://www.debian.org/security/2018/dsa-4345Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2018-14629.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/106022Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14629Exploit, Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2018/12/msg00005.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202003-52
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20181127-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3827-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3827-2/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2018/dsa-4345Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2018-14629.htmlPatch, Vendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "429202A8-61B3-400C-838E-91DE3CC66273",
              "versionEndExcluding": "4.7.12",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "952E46DC-D32E-4695-B835-19D07898713A",
              "versionEndExcluding": "4.8.7",
              "versionStartIncluding": "4.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "135631DA-32E2-483D-8157-9C32CB7432F7",
              "versionEndExcluding": "4.9.3",
              "versionStartIncluding": "4.8.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A denial of service vulnerability was discovered in Samba\u0027s LDAP server before versions 4.7.12, 4.8.7, and 4.9.3. A CNAME loop could lead to infinite recursion in the server. An unprivileged local attacker could create such an entry, leading to denial of service."
    },
    {
      "lang": "es",
      "value": "Se ha descubierto una vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el servidor LDAP de Samba en versiones anteriores a la 4.7.12, 4.8.7, y 4.9.3. Un bucle CNAME podr\u00eda conducir a una recursi\u00f3n infinita en el servidor. Un atacante local sin privilegios podr\u00eda crear una entrada as\u00ed, lo que conducir\u00eda a una denegaci\u00f3n de servicio (DoS)."
    }
  ],
  "id": "CVE-2018-14629",
  "lastModified": "2024-11-21T03:49:27.623",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-28T14:29:00.250",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106022"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14629"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00005.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20181127-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3827-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3827-2/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4345"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-14629.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106022"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14629"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20181127-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3827-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3827-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-14629.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-835"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2001-06-23 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file.
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20011002-01-P
cve@mitre.orghttp://ciac.llnl.gov/ciac/bulletins/l-105.shtml
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000405
cve@mitre.orghttp://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-027-01
cve@mitre.orghttp://us1.samba.org/samba/whatsnew/macroexploit.html
cve@mitre.orghttp://www.calderasystems.com/support/security/advisories/CSSA-2001-024.0.txt
cve@mitre.orghttp://www.debian.org/security/2001/dsa-065
cve@mitre.orghttp://www.linux-mandrake.com/en/security/2001/MDKSA-2001-062.php3
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2001-086.html
cve@mitre.orghttp://www.securityfocus.com/advisories/3423
cve@mitre.orghttp://www.securityfocus.com/archive/1/193027Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/2928Exploit, Patch, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/6731
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20011002-01-P
af854a3a-2127-422b-91ae-364da2661108http://ciac.llnl.gov/ciac/bulletins/l-105.shtml
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000405
af854a3a-2127-422b-91ae-364da2661108http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-027-01
af854a3a-2127-422b-91ae-364da2661108http://us1.samba.org/samba/whatsnew/macroexploit.html
af854a3a-2127-422b-91ae-364da2661108http://www.calderasystems.com/support/security/advisories/CSSA-2001-024.0.txt
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2001/dsa-065
af854a3a-2127-422b-91ae-364da2661108http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-062.php3
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2001-086.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/advisories/3423
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/193027Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/2928Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/6731
Impacted products
Vendor Product Version
samba samba 2.0.5
samba samba 2.0.6
samba samba 2.0.7
samba samba 2.0.8
samba samba 2.0.9
samba samba 2.2.0
hp cifs-9000_server a.01.05
hp cifs-9000_server a.01.06



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "93AF43FA-9947-4F26-96E8-1D77BF909AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A46D8D-1535-400B-B1CD-AA2685F4164D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CB46ABA-F403-4715-915D-870BD221C8FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD51F01-B47A-47F5-8798-2EB53EB17297",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C127A2E6-F94F-41D5-82AA-60C0190186BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65AC9643-E1A5-4013-9607-17C6CC7CC63B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:cifs-9000_server:a.01.05:*:*:*:*:*:*:*",
              "matchCriteriaId": "729FE6E7-5665-4A87-A281-0F904AEA1D05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:cifs-9000_server:a.01.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "46E92180-5696-49F2-8972-1949F2EBD5D7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file."
    }
  ],
  "id": "CVE-2001-1162",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2001-06-23T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20011002-01-P"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://ciac.llnl.gov/ciac/bulletins/l-105.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000405"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-027-01"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://us1.samba.org/samba/whatsnew/macroexploit.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-024.0.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2001/dsa-065"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-062.php3"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2001-086.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/advisories/3423"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/193027"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2928"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6731"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20011002-01-P"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://ciac.llnl.gov/ciac/bulletins/l-105.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000405"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-027-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://us1.samba.org/samba/whatsnew/macroexploit.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.calderasystems.com/support/security/advisories/CSSA-2001-024.0.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2001/dsa-065"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-062.php3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2001-086.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/advisories/3423"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/193027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/2928"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6731"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-08-06 18:55
Modified
2025-04-12 10:46
Severity ?
Summary
NetBIOS name services daemon (nmbd) in Samba 4.0.x before 4.0.21 and 4.1.x before 4.1.11 allows remote attackers to execute arbitrary code via unspecified vectors that modify heap memory, involving a sizeof operation on an incorrect variable in the unstrcpy macro in string_wrappers.h.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136280.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html
secalert@redhat.comhttp://secunia.com/advisories/59583
secalert@redhat.comhttp://secunia.com/advisories/59610
secalert@redhat.comhttp://secunia.com/advisories/59976
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2014-3560Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/69021
secalert@redhat.comhttp://www.securitytracker.com/id/1030663
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2305-1
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1126010
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/95081
secalert@redhat.comhttps://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=e6a848630da3ba958c442438ea131c99fa088605
secalert@redhat.comhttps://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136280.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59583
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59610
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59976
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2014-3560Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/69021
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1030663
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2305-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1126010
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/95081
af854a3a-2127-422b-91ae-364da2661108https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=e6a848630da3ba958c442438ea131c99fa088605
af854a3a-2127-422b-91ae-364da2661108https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2
Impacted products
Vendor Product Version
canonical ubuntu_linux 14.04
redhat enterprise_linux 6.0
redhat enterprise_linux 7.0
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.1.6
samba samba 4.1.7
samba samba 4.1.8
samba samba 4.1.9
samba samba 4.1.10
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.0.11
samba samba 4.0.12
samba samba 4.0.13
samba samba 4.0.14
samba samba 4.0.15
samba samba 4.0.16
samba samba 4.0.17
samba samba 4.0.18
samba samba 4.0.19
samba samba 4.0.20



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44BD172-80FA-4260-BAFB-251A95E8C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09116D2-F168-4305-9A1D-88A1D42739A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "558E0B71-F79E-47B5-90CC-9C165BB15507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D7E102-DD54-43F2-B008-66F7C243477E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8066AB8C-1AE6-4DA3-91DB-4BF67DBBA279",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E0C61-7718-4DBC-8F02-6F3C2CBE1783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "324AE9D7-C41F-493E-A1AD-FCD869D29D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "68519B1F-F315-4BBD-A4A3-4E1956D81E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF745E93-A92E-4AD7-8D42-36E9387C6915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4B760-417E-45D1-9CE1-AEBC8936BDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0DA221-078A-49DC-B0F1-F318FD785664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72BCA7B-6338-4A7C-AE71-E0B8F6C9F2F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "NetBIOS name services daemon (nmbd) in Samba 4.0.x before 4.0.21 and 4.1.x before 4.1.11 allows remote attackers to execute arbitrary code via unspecified vectors that modify heap memory, involving a sizeof operation on an incorrect variable in the unstrcpy macro in string_wrappers.h."
    },
    {
      "lang": "es",
      "value": "NetBIOS name services daemon (nmbd) en Samba 4.0.x anterior a 4.0.21 y 4.1.x anterior a 4.1.11 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores no especificados que modifican la memoria din\u00e1mica, involucrando una operaci\u00f3n sizeof sobre una variable incorrecta en la macro unstrcpy en string_wrappers.h."
    }
  ],
  "id": "CVE-2014-3560",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:A/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-08-06T18:55:05.683",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136280.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59583"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59610"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59976"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2014-3560"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/69021"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1030663"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2305-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1126010"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95081"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=e6a848630da3ba958c442438ea131c99fa088605"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136280.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-08/msg00027.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59583"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59610"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59976"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2014-3560"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/69021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1030663"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2305-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1126010"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=e6a848630da3ba958c442438ea131c99fa088605"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.samba.org/?p=samba.git%3Ba=commitdiff%3Bh=fb1d325d96dfe9bc2e9c4ec46ad4c55e8f18f4a2"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-06 10:15
Modified
2024-11-21 04:27
Summary
A flaw was found in samba 4.0.0 before samba 4.9.15 and samba 4.10.x before 4.10.10. An attacker can crash AD DC LDAP server via dirsync resulting in denial of service. Privilege escalation is not possible with this issue.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.htmlThird Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847Exploit, Issue Tracking
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2019-14847.htmlVendor Advisory
secalert@redhat.comhttps://www.synology.com/security/advisory/Synology_SA_19_35
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847Exploit, Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2019-14847.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/security/advisory/Synology_SA_19_35
Impacted products
Vendor Product Version
samba samba *
samba samba *
fedoraproject fedora 29
fedoraproject fedora 30
opensuse leap 15.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E17D7DB-DD51-416A-804A-E1BAED865FB0",
              "versionEndExcluding": "4.9.15",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC76A261-FE98-42F2-A791-47FBA16AB791",
              "versionEndExcluding": "4.10.10",
              "versionStartIncluding": "4.10.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in samba 4.0.0 before samba 4.9.15 and samba 4.10.x before 4.10.10. An attacker can crash AD DC LDAP server via dirsync resulting in denial of service. Privilege escalation is not possible with this issue."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo en samba versi\u00f3n 4.0.0 anteriores a samba 4.9.15 y samba versiones 4.10.x anteriores a 4.10.10. Un atacante puede bloquear el servidor AD DC LDAP por medio de la sincronizaci\u00f3n de directorios resultando en la denegaci\u00f3n de servicio. La escalada de privilegios no es posible con este problema."
    }
  ],
  "id": "CVE-2019-14847",
  "lastModified": "2024-11-21T04:27:29.467",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-06T10:15:10.933",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14847.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_35"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14847"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14847.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_35"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-05-12 15:15
Modified
2024-11-21 05:21
Summary
A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
References
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1941400Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2021/03/msg00036.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/
secalert@redhat.comhttps://security.gentoo.org/glsa/202105-22Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20210326-0007/Third Party Advisory
secalert@redhat.comhttps://www.debian.org/security/2021/dsa-4884Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2020-27840.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1941400Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/03/msg00036.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202105-22Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20210326-0007/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2021/dsa-4884Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2020-27840.htmlVendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2EE6834-8738-446C-BD67-B1D69AD8DFAE",
              "versionEndExcluding": "4.12.13",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54588EC1-AE17-47FD-AFB7-70AB43A49515",
              "versionEndExcluding": "4.13.6",
              "versionStartIncluding": "4.13.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B8145B4-A320-40A3-A24B-3DE0A0170639",
              "versionEndExcluding": "4.14.1",
              "versionStartIncluding": "4.14.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo en samba.\u0026#xa0;Los espacios usados en una cadena alrededor de un nombre de dominio (DN), aunque se supone que deben ser ignorados, pueden causar cadenas DN no v\u00e1lidas con espacios en lugar de escribir un byte cero en la memoria fuera de l\u00edmites, resultando en un bloqueo.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema"
    }
  ],
  "id": "CVE-2020-27840",
  "lastModified": "2024-11-21T05:21:54.707",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-12T15:15:07.543",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941400"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202105-22"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20210326-0007/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2021/dsa-4884"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-27840.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941400"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202105-22"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20210326-0007/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2021/dsa-4884"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-27840.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-10-29 20:15
Modified
2024-11-21 05:03
Summary
A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.htmlThird Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.htmlThird Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1891685Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2020/11/msg00041.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/
secalert@redhat.comhttps://security.gentoo.org/glsa/202012-24Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20201103-0001/Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2020-14323.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1891685Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/11/msg00041.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202012-24Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20201103-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2020-14323.htmlVendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D272EF5-4625-4849-AD2C-3A586743FCEF",
              "versionEndExcluding": "4.11.15",
              "versionStartIncluding": "3.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "163B1F95-F904-4C26-8E77-DEC708753D78",
              "versionEndExcluding": "4.12.9",
              "versionStartIncluding": "4.12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "240B16EE-E139-40D2-BCB5-2A635031EC19",
              "versionEndExcluding": "4.13.1",
              "versionStartIncluding": "4.13.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A null pointer dereference flaw was found in samba\u0027s Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 uno fallo de desreferencia del puntero null en el servicio Winbind de samba en versiones anteriores a 4.11.15, 4.12.9 y 4.13.1.\u0026#xa0;Un usuario local podr\u00eda utilizar este fallo para bloquear el servicio winbind causando una denegaci\u00f3n de servicio"
    }
  ],
  "id": "CVE-2020-14323",
  "lastModified": "2024-11-21T05:03:00.507",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2020-10-29T20:15:17.117",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891685"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202012-24"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20201103-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-14323.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1891685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JE2M4FE3N3EDXVG4UKSVFPL7SQUGFFDP/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W6HM73N4NEGFW5GIJJGGP6ZZBS6GTXPB/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202012-24"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20201103-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-14323.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-170"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-07-07 15:59
Modified
2025-04-12 10:46
Summary
libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2016-07/msg00060.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-1486.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-1487.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-1494.htmlThird Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/91700Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1036244Third Party Advisory, VDB Entry
secalert@redhat.comhttps://security.gentoo.org/glsa/201805-07Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2016-2119.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2016-07/msg00060.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1486.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1487.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-1494.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/91700Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1036244Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201805-07Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2016-2119.htmlVendor Advisory
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6FD4346-FDE6-40F8-AAC5-F72ED275E4F3",
              "versionEndExcluding": "4.2.14",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "549834A6-DDF7-4C48-9626-EEF4668AE77C",
              "versionEndExcluding": "4.3.11",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D45F68E2-A9BF-4B0C-9699-3D4D9419B405",
              "versionEndExcluding": "4.4.5",
              "versionStartIncluding": "4.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libcli/smb/smbXcli_base.c in Samba 4.x before 4.2.14, 4.3.x before 4.3.11, and 4.4.x before 4.4.5 allows man-in-the-middle attackers to bypass a client-signing protection mechanism, and consequently spoof SMB2 and SMB3 servers, via the (1) SMB2_SESSION_FLAG_IS_GUEST or (2) SMB2_SESSION_FLAG_IS_NULL flag."
    },
    {
      "lang": "es",
      "value": "ibcli/smb/smbXcli_base.c en Samba 4.x en versiones anteriores a 4.2.14, 4.3.x en versiones anteriores a 4.3.11 y 4.4.x en versiones anteriores a 4.4.5 permite a atacantes man-in-the-middle eludir el mecanismo de protecci\u00f3n de firmado de cliente y consecuentemente suplantar los servidores SMB2 y SMB3, a trav\u00e9s de los indicadores (1) SMB2_SESSION_FLAG_IS_GUEST o (2) SMB2_SESSION_FLAG_IS_NULL."
    }
  ],
  "id": "CVE-2016-2119",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-07-07T15:59:00.133",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1486.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1487.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1494.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/91700"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1036244"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-07"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2119.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2016-07/msg00060.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1486.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1487.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-1494.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/91700"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1036244"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-07"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2119.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-03-03 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The mksmbpasswd shell script (mksmbpasswd.sh) in Samba 3.0.0 and 3.0.1, when creating an account but marking it as disabled, may overwrite the user password with an uninitialized buffer, which could enable the account with a more easily guessable password.
Impacted products
Vendor Product Version
samba samba 3.0.0
samba samba 3.0.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The mksmbpasswd shell script (mksmbpasswd.sh) in Samba 3.0.0 and 3.0.1, when creating an account but marking it as disabled, may overwrite the user password with an uninitialized buffer, which could enable the account with a more easily guessable password."
    },
    {
      "lang": "es",
      "value": "mksmbpasswd en Samba 3.0.0 y 3.0.1, cuando se crea una cuenta pero se marca como desactivada, puede sobreescribir la contrase\u00f1a de usaurio con un b\u00fafer sin inicializar, lo que podr\u00eda activar la cuenta con una contrase\u00f1a m\u00e1s facil de adivinar."
    }
  ],
  "id": "CVE-2004-0082",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-03-03T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://us1.samba.org/samba/ftp/WHATSNEW-3.0.2a.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ciac.org/ciac/bulletins/o-078.shtml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/3919"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-064.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9637"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vuxml.org/freebsd/3388eff9-5d6e-11d8-80e3-0020ed76ef5a.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15132"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A827"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://us1.samba.org/samba/ftp/WHATSNEW-3.0.2a.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ciac.org/ciac/bulletins/o-078.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/3919"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2004-064.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vuxml.org/freebsd/3388eff9-5d6e-11d8-80e3-0020ed76ef5a.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15132"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A827"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-12-13 21:46
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
References
PSIRT-CNA@flexerasoftware.comhttp://bugs.gentoo.org/show_bug.cgi?id=200773
PSIRT-CNA@flexerasoftware.comhttp://docs.info.apple.com/article.html?artnum=307430
PSIRT-CNA@flexerasoftware.comhttp://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html
PSIRT-CNA@flexerasoftware.comhttp://lists.vmware.com/pipermail/security-announce/2008/000005.html
PSIRT-CNA@flexerasoftware.comhttp://marc.info/?l=bugtraq&m=120524782005154&w=2
PSIRT-CNA@flexerasoftware.comhttp://marc.info/?l=bugtraq&m=120524782005154&w=2
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27760Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27894
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27977
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27993
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27999
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28003
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28028
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28029
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28037
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28067
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28089
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28891
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/29032
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/29341
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/30484
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/30835
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/secunia_research/2007-99/advisory/Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://security.gentoo.org/glsa/glsa-200712-10.xml
PSIRT-CNA@flexerasoftware.comhttp://securityreason.com/securityalert/3438
PSIRT-CNA@flexerasoftware.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.451554
PSIRT-CNA@flexerasoftware.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1
PSIRT-CNA@flexerasoftware.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1
PSIRT-CNA@flexerasoftware.comhttp://support.avaya.com/elmodocs2/security/ASA-2007-520.htm
PSIRT-CNA@flexerasoftware.comhttp://www.debian.org/security/2007/dsa-1427
PSIRT-CNA@flexerasoftware.comhttp://www.kb.cert.org/vuls/id/438395US Government Resource
PSIRT-CNA@flexerasoftware.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:244
PSIRT-CNA@flexerasoftware.comhttp://www.novell.com/linux/security/advisories/2007_68_samba.html
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1114.htmlPatch
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1117.html
PSIRT-CNA@flexerasoftware.comhttp://www.samba.org/samba/security/CVE-2007-6015.htmlPatch
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/archive/1/484818/100/0/threaded
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/archive/1/484825/100/0/threaded
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/archive/1/484827/100/0/threaded
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/archive/1/485144/100/0/threaded
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/archive/1/488457/100/0/threaded
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/bid/26791
PSIRT-CNA@flexerasoftware.comhttp://www.securitytracker.com/id?1019065
PSIRT-CNA@flexerasoftware.comhttp://www.ubuntu.com/usn/usn-556-1
PSIRT-CNA@flexerasoftware.comhttp://www.us-cert.gov/cas/techalerts/TA08-043B.htmlUS Government Resource
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2007/4153
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/0495/references
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/0637
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/0859/references
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/1712/references
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/1908
PSIRT-CNA@flexerasoftware.comhttp://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
PSIRT-CNA@flexerasoftware.comhttp://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
PSIRT-CNA@flexerasoftware.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/38965
PSIRT-CNA@flexerasoftware.comhttps://issues.rpath.com/browse/RPL-1976
PSIRT-CNA@flexerasoftware.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572
PSIRT-CNA@flexerasoftware.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605
PSIRT-CNA@flexerasoftware.comhttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html
PSIRT-CNA@flexerasoftware.comhttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.gentoo.org/show_bug.cgi?id=200773
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=307430
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.vmware.com/pipermail/security-announce/2008/000005.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=120524782005154&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=120524782005154&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27760Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27894
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27977
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27993
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27999
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28003
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28028
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28029
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28037
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28067
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28089
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28891
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29032
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29341
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30484
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30835
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2007-99/advisory/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200712-10.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3438
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.451554
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1
af854a3a-2127-422b-91ae-364da2661108http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1427
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/438395US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:244
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_68_samba.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1114.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1117.html
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2007-6015.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/484818/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/484825/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/484827/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/485144/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/488457/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26791
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019065
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-556-1
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA08-043B.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4153
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0495/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0637
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0859/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1712/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1908
af854a3a-2127-422b-91ae-364da2661108http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
af854a3a-2127-422b-91ae-364da2661108http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/38965
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1976
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html
Impacted products
Vendor Product Version
samba samba 2.0.1
samba samba 2.0.2
samba samba 2.0.3
samba samba 2.0.4
samba samba 2.0.5
samba samba 2.0.6
samba samba 2.0.7
samba samba 2.0.8
samba samba 2.0.9
samba samba 2.0.10
samba samba 2.2.0
samba samba 2.2.0a
samba samba 2.2.1a
samba samba 2.2.2
samba samba 2.2.3
samba samba 2.2.3a
samba samba 2.2.4
samba samba 2.2.5
samba samba 2.2.6
samba samba 2.2.7
samba samba 2.2.7a
samba samba 2.2.8
samba samba 2.2.8a
samba samba 2.2.9
samba samba 2.2.11
samba samba 2.2.12
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D03B96-8FF3-4FC6-BC38-288F3ADBA9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF2248C-5A71-49FC-88F4-2D1F376155FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FD10B2-ED2D-4F55-8F0E-77429C8A716E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F15704-2F2B-4536-A2A0-510B5CE91D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "93AF43FA-9947-4F26-96E8-1D77BF909AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A46D8D-1535-400B-B1CD-AA2685F4164D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CB46ABA-F403-4715-915D-870BD221C8FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD51F01-B47A-47F5-8798-2EB53EB17297",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C127A2E6-F94F-41D5-82AA-60C0190186BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "61291A4C-28A3-433B-80D2-005976851882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65AC9643-E1A5-4013-9607-17C6CC7CC63B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "090E2541-2DBA-41CB-A792-9E703C797949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F65FF3-71F8-4278-A823-A6E0FF65D9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C71CB60-2689-4A4A-9509-E2F3135E6491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0129E404-3AE8-4F0E-89CB-7F2FA5B47011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "614547F5-9C3F-489B-9B72-91B0FF646CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A052141C-874D-4ED0-99FB-D7468FACFC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9739EA65-9FA8-425E-B355-E690773D5B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B618F94-DAC2-4A97-9F7F-8BCEA3199769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE7C057-B024-4417-B572-5D396366620E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DC3500-F8F0-46E1-B0AA-C2474CCB3DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFCD334C-FB95-41A6-8F4C-FCC4E70CE930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "75C86202-3150-440C-B048-BB039E9D3606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CAF474-0C3A-4E49-8CF8-9DF14D84CDCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92304DE-CFBB-4C03-AA7F-54DB3C14ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "04F39AA5-9048-4EE9-B0F2-CE679C673F0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the \"domain logons\" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n send_mailslot de nmbd en Samba 3.0.0 hasta 3.0.27a, cuando la opci\u00f3n \"inicios de sesi\u00f3n de dominio\" est\u00e1 habilitada, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una petici\u00f3n de ranura de buz\u00f3n GETDC compuesta de una cadena larga GETDC a la que sigue un nombre de usuario en una petici\u00f3n de inicio de sesi\u00f3n SAMLOGON."
    }
  ],
  "id": "CVE-2007-6015",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-12-13T21:46:00.000",
  "references": [
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=200773"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://docs.info.apple.com/article.html?artnum=307430"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27760"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27894"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27977"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27993"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27999"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/28003"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/28028"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/28029"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/28037"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/28067"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/28089"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/28891"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/29032"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/29341"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/30484"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/30835"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2007-99/advisory/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://security.gentoo.org/glsa/glsa-200712-10.xml"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securityreason.com/securityalert/3438"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.451554"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.debian.org/security/2007/dsa-1427"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/438395"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:244"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.novell.com/linux/security/advisories/2007_68_samba.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1114.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1117.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2007-6015.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/484818/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/484825/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/484827/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/485144/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/bid/26791"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securitytracker.com/id?1019065"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.ubuntu.com/usn/usn-556-1"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-043B.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2007/4153"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2008/0495/references"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2008/0637"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2008/0859/references"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2008/1712/references"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2008/1908"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38965"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://issues.rpath.com/browse/RPL-1976"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.gentoo.org/show_bug.cgi?id=200773"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=307430"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2008/Feb/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.vmware.com/pipermail/security-announce/2008/000005.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27760"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27894"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27977"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27993"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27999"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28003"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28028"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28037"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28067"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28891"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29341"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30484"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/secunia_research/2007-99/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200712-10.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.451554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-238251-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1019295.1-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1427"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/438395"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:244"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_68_samba.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1114.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1117.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2007-6015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/484818/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/484825/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/484827/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/485144/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/488457/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019065"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-556-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA08-043B.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/4153"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0495/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0637"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0859/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1712/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38965"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1976"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11572"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5605"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00304.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00308.html"
    }
  ],
  "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-08-06 02:56
Modified
2025-04-11 00:51
Severity ?
Summary
Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
References
secalert@redhat.comhttp://archives.neohapsis.com/archives/bugtraq/2013-08/0028.html
secalert@redhat.comhttp://ftp.samba.org/pub/samba/patches/security/samba-4.0.7-CVE-2013-4124.patchPatch
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2013-August/113591.htmlVendor Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2013-August/114011.htmlVendor Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.htmlVendor Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.htmlVendor Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=141660010015249&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=141660010015249&w=2
secalert@redhat.comhttp://osvdb.org/95969
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1310.htmlVendor Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1542.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1543.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0305.html
secalert@redhat.comhttp://secunia.com/advisories/54519Vendor Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201502-15.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2013:207
secalert@redhat.comhttp://www.samba.org/samba/history/samba-3.5.22.htmlVendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/history/samba-3.6.17.htmlVendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/history/samba-4.0.8.htmlVendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2013-4124Vendor Advisory
secalert@redhat.comhttp://www.securitytracker.com/id/1028882
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1966-1Vendor Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=984401
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/86185
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2013-08/0028.html
af854a3a-2127-422b-91ae-364da2661108http://ftp.samba.org/pub/samba/patches/security/samba-4.0.7-CVE-2013-4124.patchPatch
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113591.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114011.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=141660010015249&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=141660010015249&w=2
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/95969
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1310.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1542.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1543.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0305.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/54519Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201502-15.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2013:207
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/history/samba-3.5.22.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/history/samba-3.6.17.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/history/samba-4.0.8.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2013-4124Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1028882
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1966-1Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=984401
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/86185
Impacted products
Vendor Product Version
canonical ubuntu_linux 10.04
canonical ubuntu_linux 12.04
canonical ubuntu_linux 12.10
canonical ubuntu_linux 13.04
redhat enterprise_linux 5
fedoraproject fedora 18
fedoraproject fedora 19
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27
samba samba 3.0.27
samba samba 3.0.28
samba samba 3.0.28
samba samba 3.0.29
samba samba 3.0.30
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.0.34
samba samba 3.0.35
samba samba 3.0.36
samba samba 3.0.37
samba samba 3.1.0
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12
samba samba 3.2.13
samba samba 3.2.14
samba samba 3.2.15
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.3.8
samba samba 3.3.9
samba samba 3.3.10
samba samba 3.3.11
samba samba 3.3.12
samba samba 3.3.13
samba samba 3.3.14
samba samba 3.3.15
samba samba 3.3.16
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4
samba samba 3.4.5
samba samba 3.4.6
samba samba 3.4.7
samba samba 3.4.8
samba samba 3.4.9
samba samba 3.4.10
samba samba 3.4.11
samba samba 3.4.12
samba samba 3.4.13
samba samba 3.4.14
samba samba 3.4.15
samba samba 3.4.16
samba samba 3.4.17
samba samba 3.5.0
samba samba 3.5.1
samba samba 3.5.2
samba samba 3.5.10
samba samba 3.5.11
samba samba 3.5.12
samba samba 3.5.13
samba samba 3.5.14
samba samba 3.5.15
samba samba 3.5.16
samba samba 3.5.17
samba samba 3.5.18
samba samba 3.5.19
samba samba 3.5.20
samba samba 3.5.21
samba samba 3.6.0
samba samba 3.6.1
samba samba 3.6.2
samba samba 3.6.3
samba samba 3.6.4
samba samba 3.6.5
samba samba 3.6.6
samba samba 3.6.7
samba samba 3.6.8
samba samba 3.6.9
samba samba 3.6.10
samba samba 3.6.11
samba samba 3.6.12
samba samba 3.6.13
samba samba 3.6.14
samba samba 3.6.15
samba samba 3.6.16
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
opensuse opensuse 12.2
opensuse opensuse 12.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "5D37DF0F-F863-45AC-853A-3E04F9FEC7CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B6B7CAD7-9D4E-4FDB-88E3-1E583210A01F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA9B3CC0-DF1C-4A86-B2A3-A9D428A5A6E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E14271AE-1309-48F3-B9C6-D7DEEC488279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
              "matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "A8CE218B-E64D-41DC-8CFD-9387427B72CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
              "matchCriteriaId": "9C2CDC66-8A44-4BEE-9574-FC69C38295A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
              "matchCriteriaId": "9AD55F6B-F753-41FC-8701-78A7DA556E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
              "matchCriteriaId": "0B63F362-A49C-401F-BE49-C6E1DC03E4F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
              "matchCriteriaId": "81F23C27-76CF-4906-B829-3B4F2E07900E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
              "matchCriteriaId": "EF6C8992-5210-483E-9EED-B7FC1EACA703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
              "matchCriteriaId": "EAF9C0EA-173A-4B02-9933-09DFAC31398D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "D87FDC2E-C6D9-4D10-BED6-B10C40232DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
              "matchCriteriaId": "A90CE26E-8993-49BA-91BF-536DBC44CAD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
              "matchCriteriaId": "33A9C2ED-355B-4903-ABC3-23C85B494053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
              "matchCriteriaId": "375BCF42-1A8A-4ACB-8198-FEA471A81B76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
              "matchCriteriaId": "C1C6E9D6-2964-4D63-9FCB-B4A02CC21975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
              "matchCriteriaId": "F8C1CA41-DBEF-46D7-9A94-930315BECACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
              "matchCriteriaId": "F6804F20-3B33-4FAA-ACC3-9658FF0770D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
              "matchCriteriaId": "0FFB13DF-53C5-4DF4-8D47-B40BD532E1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
              "matchCriteriaId": "49684CD5-4256-47CA-84BC-E319D8973314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
              "matchCriteriaId": "574ADE47-94CB-42A2-AE8E-A14FBB0EAFB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC56F11D-20DE-4399-AED1-DF42C7E62F97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "254D9460-899D-4D06-AC47-1914A42FC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "427DA06C-9F5C-4E9A-A39F-22CD5E4F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60CED3E-B7A6-4674-ADD5-A3B047C7D125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "07906A18-FD60-42A5-AC17-21F677EA1762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "A99F7DCF-CBD0-4BC1-9C07-F1CB807614BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFC3F99-11F6-496E-BF55-53CF1E012FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C93E46D-FDEA-4B59-8C84-8A3DCC6AB3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4633D2E-2CBE-4B92-AD35-ED57C5399ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F200FC8-DA2E-4D39-8FF7-423759307DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B7341D-B02F-405B-81A0-5F74CFA8F8E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207B352-D8F8-4E15-9507-D3AD10D56211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBA51B-159F-42E9-8A2C-2B9BF1EB7D98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8F01226-D9E6-460C-975A-618932D5F16F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD98764-741C-4FED-BE4D-446E8E8D31F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4048DF8D-628D-4786-A883-0A1865DEBB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E7A4E4-940B-43C4-98A2-70F443A59120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82A06CD-338D-4095-BC7D-2E38050D388A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8C2E40-DA05-4B50-AB29-398AF71EBECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EE762A-F95F-42CF-BB80-B0EF81A438EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "738095D8-8ACE-4CF4-9D97-4228FC686F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4634FC-DA4E-4B1D-B1AB-A45D8235780D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA83A66-BD39-4560-8EAF-ADF2433EF36D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B1F854-FC98-4DE9-8514-FD52301C5038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "388B4551-AF4C-46D6-840E-D489B05675C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F9D2E0-C795-4A5A-9398-4630B78FCB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D176AD-EA34-4DA2-9926-079438030E74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CF8CA5-0821-49CF-8B8C-2D2D5F63A061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A89C5FB-AA8B-41DC-93D5-81E199D73061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E71E10D0-E7C2-4D14-B685-4FB154B0A865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "05993D31-BC6D-44CD-808C-4A40F998BF0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "406C2297-B58D-4623-9E7A-2C438ABBAC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6AF0DD4-08D4-4726-8A12-E979FF3322B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F98DE75F-84AD-42EE-B9DA-8AFF22D2BF3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3DAE05B-9086-4702-9586-77B34399E1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA544013-8FAC-4452-9D38-081C514E2981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DE15C9-3308-4DE0-8048-9B06AF4D7343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CB4968-F331-4653-8B9F-75BA4BB7A6D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3470D075-CCF2-42A1-A8C9-E375FC05FF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA72F88-6799-4E6C-B73C-C92616B04661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF17CB71-6E46-4A1E-9EAB-7D2E182D56C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E7FA486-73CE-4226-86C6-DA8383C5578F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17D2B72-19E2-4DE6-B1E3-F1823E2690BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC6922A-03CD-484A-BF40-F8F937428062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "8470C251-2874-4047-A759-F8D5C6D5C755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D806A17E-B8F9-466D-807D-3F1E77603DC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the read_nttrans_ea_list function in nttrans.c in smbd in Samba 3.x before 3.5.22, 3.6.x before 3.6.17, and 4.x before 4.0.8 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de entero en la funci\u00f3n read_nttrans_ea_list en nttrans.c en smbd en Samba v3.x anterior a v3.5.22, v3.6.x anterior a v3.6.17, y v4.x anterior a v4.0.8 permite a atacantes remotos causar una denegaci\u00f3n de servicio (por excesivo consumo de memoria) a trav\u00e9s de un paquete con formato err\u00f3neo."
    }
  ],
  "id": "CVE-2013-4124",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-08-06T02:56:00.710",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0028.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://ftp.samba.org/pub/samba/patches/security/samba-4.0.7-CVE-2013-4124.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113591.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114011.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/95969"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1543.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54519"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:207"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-3.5.22.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-3.6.17.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-4.0.8.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-4124"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1028882"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-1966-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=984401"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86185"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2013-08/0028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://ftp.samba.org/pub/samba/patches/security/samba-4.0.7-CVE-2013-4124.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/113591.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2013-August/114011.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=141660010015249\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/95969"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1543.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/54519"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2013:207"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-3.5.22.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-3.6.17.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-4.0.8.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-4124"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1028882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-1966-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=984401"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/86185"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-03-26 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or "hide unreadable" parameter.
Impacted products
Vendor Product Version
canonical ubuntu_linux 12.04
samba samba *
samba samba 3.6.0
samba samba 3.6.1
samba samba 3.6.2
samba samba 3.6.3
samba samba 3.6.4
ibm storwize v7000
ibm storwize v7000



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
              "matchCriteriaId": "F5D324C4-97C7-49D3-A809-9EAD4B690C69",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8B4B6AD-425B-43F5-BBDC-3109CBD33F6D",
              "versionEndIncluding": "3.6.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "406C2297-B58D-4623-9E7A-2C438ABBAC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6AF0DD4-08D4-4726-8A12-E979FF3322B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:storwize:v7000:1.3:*:*:*:*:*:*",
              "matchCriteriaId": "BDD7FC50-A974-4C73-8217-F4E838C30286",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:storwize:v7000:1.4:*:*:*:*:*:*",
              "matchCriteriaId": "9CB5E582-68FB-4513-9C2E-474E2B7B47CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SMB2 implementation in Samba 3.6.x before 3.6.6, as used on the IBM Storwize V7000 Unified 1.3 before 1.3.2.3 and 1.4 before 1.4.0.1 and possibly other products, does not properly enforce CIFS share attributes, which allows remote authenticated users to (1) write to a read-only share; (2) trigger data-integrity problems related to the oplock, locking, coherency, or leases attribute; or (3) have an unspecified impact by leveraging incorrect handling of the browseable or \"hide unreadable\" parameter."
    },
    {
      "lang": "es",
      "value": "Samba anterior a v3.6.6, tal como se utiliza en el IBM Storwize V7000 Unified v1.3 anterior a v1.3.2.3, y v1.4 anterior a  v1.4.0.1 y posiblemente otros productos, no se aplican correctamente los atributos de CIFS de compartici\u00f3n, lo que permite a usuarios remotos autenticados para (1) escribir en un participaci\u00f3n de s\u00f3lo lectura, (2) disparar problemas de integridad de datos relacionados con la operaci\u00f3n de bloqueo, bloqueo, coherencia, arrendamiento de atributo, o (3) tener un impacto no especificado mediante el aprovechamiento de la manipulaci\u00f3n incorrecta del par\u00e1metro \"hide unreadable\"."
    }
  ],
  "id": "CVE-2013-0454",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-03-26T21:55:01.100",
  "references": [
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004289"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-1802-1"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928419"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=8738"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80970"
    },
    {
      "source": "psirt@us.ibm.com",
      "url": "https://lists.samba.org/archive/samba-announce/2012/000259.html"
    },
    {
      "source": "psirt@us.ibm.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2013-0454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=ssg1S1004289"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-1802-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=928419"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=8738"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/80970"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.samba.org/archive/samba-announce/2012/000259.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2013-0454"
    }
  ],
  "sourceIdentifier": "psirt@us.ibm.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-06-23 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2014-0279.html
secalert@redhat.comhttp://linux.oracle.com/errata/ELSA-2014-0866.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0866.html
secalert@redhat.comhttp://secunia.com/advisories/59378
secalert@redhat.comhttp://secunia.com/advisories/59407
secalert@redhat.comhttp://secunia.com/advisories/59433
secalert@redhat.comhttp://secunia.com/advisories/59579
secalert@redhat.comhttp://secunia.com/advisories/59834
secalert@redhat.comhttp://secunia.com/advisories/59848
secalert@redhat.comhttp://secunia.com/advisories/59919
secalert@redhat.comhttp://secunia.com/advisories/61218
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201502-15.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2014:136
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:082
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2014-3493Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/532757/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/68150
secalert@redhat.comhttp://www.securitytracker.com/id/1030455
secalert@redhat.comhttps://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1108748
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2014-0279.html
af854a3a-2127-422b-91ae-364da2661108http://linux.oracle.com/errata/ELSA-2014-0866.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0866.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59378
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59407
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59433
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59579
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59834
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59848
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59919
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61218
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201502-15.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2014:136
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:082
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2014-3493Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/532757/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/68150
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1030455
af854a3a-2127-422b-91ae-364da2661108https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1108748
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
Impacted products
Vendor Product Version
samba samba 3.6.0
samba samba 3.6.1
samba samba 3.6.2
samba samba 3.6.3
samba samba 3.6.4
samba samba 3.6.5
samba samba 3.6.6
samba samba 3.6.7
samba samba 3.6.8
samba samba 3.6.9
samba samba 3.6.10
samba samba 3.6.11
samba samba 3.6.12
samba samba 3.6.13
samba samba 3.6.14
samba samba 3.6.15
samba samba 3.6.16
samba samba 3.6.17
samba samba 3.6.18
samba samba 3.6.19
samba samba 3.6.20
samba samba 3.6.21
samba samba 3.6.22
samba samba 3.6.23
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.1.6
samba samba 4.1.7
samba samba 4.1.8
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.0.11
samba samba 4.0.12
samba samba 4.0.13
samba samba 4.0.14
samba samba 4.0.15
samba samba 4.0.16
samba samba 4.0.17
samba samba 4.0.18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "406C2297-B58D-4623-9E7A-2C438ABBAC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6AF0DD4-08D4-4726-8A12-E979FF3322B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F98DE75F-84AD-42EE-B9DA-8AFF22D2BF3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3DAE05B-9086-4702-9586-77B34399E1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA544013-8FAC-4452-9D38-081C514E2981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DE15C9-3308-4DE0-8048-9B06AF4D7343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CB4968-F331-4653-8B9F-75BA4BB7A6D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3470D075-CCF2-42A1-A8C9-E375FC05FF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA72F88-6799-4E6C-B73C-C92616B04661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF17CB71-6E46-4A1E-9EAB-7D2E182D56C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E7FA486-73CE-4226-86C6-DA8383C5578F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17D2B72-19E2-4DE6-B1E3-F1823E2690BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC6922A-03CD-484A-BF40-F8F937428062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "8470C251-2874-4047-A759-F8D5C6D5C755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "332308A1-4BA4-4BC7-8B4B-7463CF98B664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7DEA84-27E5-4CF0-AC2A-B128BB5AE199",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "455B73D1-E8F1-478C-8CEB-79E4B5F33A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC49023-CAD6-4875-BF94-EEC290E8A5A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42BFAF8-5822-4782-B60D-BCB131834419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1FD9EF-A863-48C6-8471-AB1D80B3C1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B8A690-81D0-40C4-9301-CF1992C2DA0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44BD172-80FA-4260-BAFB-251A95E8C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09116D2-F168-4305-9A1D-88A1D42739A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "558E0B71-F79E-47B5-90CC-9C165BB15507",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E0C61-7718-4DBC-8F02-6F3C2CBE1783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "324AE9D7-C41F-493E-A1AD-FCD869D29D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "68519B1F-F315-4BBD-A4A3-4E1956D81E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF745E93-A92E-4AD7-8D42-36E9387C6915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4B760-417E-45D1-9CE1-AEBC8936BDA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The push_ascii function in smbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) via an attempt to read a Unicode pathname without specifying use of Unicode, leading to a character-set conversion failure that triggers an invalid pointer dereference."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n push_ascii en smbd en Samba 3.6.x anterior a 3.6.24, 4.0.x anterior a 4.0.19 y 4.1.x anterior a 4.1.9 permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria y ca\u00edda de demonio) a trav\u00e9s de in intento de leer un nombre de ruta Unicode sin especificar el uso de Unicode, que conduce a un fallo de conversi\u00f3n de configuraci\u00f3n de car\u00e1cter que provoca una referencia a puntero inv\u00e1lida."
    }
  ],
  "id": "CVE-2014-3493",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.7,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 5.1,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-06-23T14:55:05.357",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://advisories.mageia.org/MGASA-2014-0279.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59378"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59407"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59433"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59579"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59834"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59848"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59919"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/61218"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2014-3493"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/68150"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1030455"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108748"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://advisories.mageia.org/MGASA-2014-0279.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59378"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59433"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59848"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59919"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61218"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2014-3493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/68150"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1030455"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1108748"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-06-25 01:30
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename.
References
secalert@redhat.comhttp://secunia.com/advisories/35539Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/35573
secalert@redhat.comhttp://secunia.com/advisories/35606
secalert@redhat.comhttp://secunia.com/advisories/36918
secalert@redhat.comhttp://www.debian.org/security/2009/dsa-1823
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:196
secalert@redhat.comhttp://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patchPatch, Vendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2009-1886.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/35472Patch
secalert@redhat.comhttp://www.securitytracker.com/id?1022441
secalert@redhat.comhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.521591
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-839-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/1664Patch, Vendor Advisory
secalert@redhat.comhttps://bugzilla.samba.org/show_bug.cgi?id=6478
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/51328
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35539Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35573
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35606
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36918
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1823
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:196
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patchPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2009-1886.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/35472Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022441
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.521591
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-839-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1664Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=6478
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/51328
Impacted products
Vendor Product Version
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de formato de cadena en client/client.c en smbclient en Samba v3.2.0 hasta v3.2.12 podr\u00eda permitir dependiendo del contexto a atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del formato de cadena especificado en un nombre de fichero."
    }
  ],
  "id": "CVE-2009-1886",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-06-25T01:30:01.717",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35539"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/35573"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/35606"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/36918"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2009/dsa-1823"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:196"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2009-1886.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/35472"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1022441"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.521591"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-839-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1664"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=6478"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51328"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35539"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35573"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/36918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:196"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1886.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2009-1886.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/35472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022441"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.521591"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-839-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1664"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=6478"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51328"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions of samba as shipped with Red Hat Enterprise Linux 3, 4, or 5.",
      "lastModified": "2009-06-29T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-01-17 18:15
Modified
2025-01-22 16:10
Summary
An information leak vulnerability was discovered in Samba's LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store.
References
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2023/11/28/4Mailing List
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1625445Exploit, Issue Tracking, Patch, Third Party Advisory
secalert@redhat.comhttps://bugzilla.samba.org/show_bug.cgi?id=13595Exploit, Issue Tracking, Patch, Vendor Advisory
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DK57HQRTCDOZDIIICYWQ4Z5IQXTWVVW/Patch, Third Party Advisory
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVMYEP5KJRL3FWSCZW2MQZ26IVPXY62/Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2023/11/28/4Mailing List
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1625445Exploit, Issue Tracking, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=13595Exploit, Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DK57HQRTCDOZDIIICYWQ4Z5IQXTWVVW/Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVMYEP5KJRL3FWSCZW2MQZ26IVPXY62/Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20230223-0008/Third Party Advisory
Impacted products
Vendor Product Version
samba samba *
samba samba *
fedoraproject fedora 37



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D5D18F8-E566-46F4-A9AB-79126F369E86",
              "versionEndExcluding": "4.18.9",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF28158F-BE64-4887-83CD-93AC6C5CD5D2",
              "versionEndExcluding": "4.19.3",
              "versionStartIncluding": "4.19.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An information leak vulnerability was discovered in Samba\u0027s LDAP server. Due to missing access control checks, an authenticated but unprivileged attacker could discover the names and preserved attributes of deleted objects in the LDAP store."
    },
    {
      "lang": "es",
      "value": "Se descubri\u00f3 una vulnerabilidad de fuga de informaci\u00f3n en el servidor LDAP de Samba. Debido a la falta de comprobaciones de control de acceso, un atacante autenticado pero sin privilegios podr\u00eda descubrir los nombres y atributos conservados de los objetos eliminados en el almac\u00e9n LDAP."
    }
  ],
  "id": "CVE-2018-14628",
  "lastModified": "2025-01-22T16:10:38.410",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-01-17T18:15:10.810",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/11/28/4"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=13595"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DK57HQRTCDOZDIIICYWQ4Z5IQXTWVVW/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVMYEP5KJRL3FWSCZW2MQZ26IVPXY62/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2023/11/28/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1625445"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=13595"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6DK57HQRTCDOZDIIICYWQ4Z5IQXTWVVW/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ACVMYEP5KJRL3FWSCZW2MQZ26IVPXY62/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230223-0008/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-04-03 23:15
Modified
2025-02-18 16:15
Summary
A flaw was found in Samba. An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory.
Impacted products
Vendor Product Version
samba samba *
samba samba 4.18.0
samba samba 4.18.0
samba samba 4.18.0
samba samba 4.18.0
samba samba 4.18.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F914D5D-6211-4CF3-87AB-71284AD225A3",
              "versionEndExcluding": "4.17.7",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "D9A6E955-CE26-405F-9468-4557A256CA8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E9604B46-FDA2-4CA1-971F-315AFD250033",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1C209E4C-098B-4D49-A21B-AC8154FE3D85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "2849132A-18B1-4A49-8B2E-8B6DCFCC0501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "F657608C-18FB-49FA-A73E-F9BF5CD95B17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in Samba. An incomplete access check on dnsHostName allows authenticated but otherwise unprivileged users to delete this attribute from any object in the directory."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo en Samba. Una comprobaci\u00f3n de acceso incompleta en dnsHostName permite a usuarios autenticados pero sin privilegios eliminar este atributo de cualquier objeto del directorio."
    }
  ],
  "id": "CVE-2023-0225",
  "lastModified": "2025-02-18T16:15:14.343",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-04-03T23:15:06.907",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-0225.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-0225.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-09 22:15
Modified
2025-01-02 22:15
Summary
Netlogon RPC Elevation of Privilege Vulnerability



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
              "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4455CF3A-CC91-4BE4-A7AB-929AC82E34F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "703773B3-EE5B-41F5-A2D9-B56F96B8793D",
              "versionEndExcluding": "4.15.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10AA6759-95FC-47A6-AA92-342893A2B23E",
              "versionEndExcluding": "4.16.8",
              "versionStartIncluding": "4.16.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E911B3-B4DD-451C-9579-74559328F89F",
              "versionEndExcluding": "4.17.4",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Netlogon RPC Elevation of Privilege Vulnerability"
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Netlogon RPC"
    }
  ],
  "id": "CVE-2022-38023",
  "lastModified": "2025-01-02T22:15:15.160",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "secure@microsoft.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-09T22:15:16.203",
  "references": [
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-38023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202309-06"
    }
  ],
  "sourceIdentifier": "secure@microsoft.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-04-03 23:15
Modified
2025-02-13 15:15
Summary
The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba 4.18.0
samba samba 4.18.0
samba samba 4.18.0
samba samba 4.18.0
samba samba 4.18.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4199E7A4-284A-45D7-84C7-AF0141FD94EE",
              "versionEndExcluding": "4.16.10",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F914D5D-6211-4CF3-87AB-71284AD225A3",
              "versionEndExcluding": "4.17.7",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "D9A6E955-CE26-405F-9468-4557A256CA8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E9604B46-FDA2-4CA1-971F-315AFD250033",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1C209E4C-098B-4D49-A21B-AC8154FE3D85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "2849132A-18B1-4A49-8B2E-8B6DCFCC0501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "F657608C-18FB-49FA-A73E-F9BF5CD95B17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The fix in 4.6.16, 4.7.9, 4.8.4 and 4.9.7 for CVE-2018-10919 Confidential attribute disclosure vi LDAP filters was insufficient and an attacker may be able to obtain confidential BitLocker recovery keys from a Samba AD DC."
    },
    {
      "lang": "es",
      "value": "La correcci\u00f3n en 4.6.16, 4.7.9, 4.8.4 y 4.9.7 para CVE-2018-10919 Confidential Attribute Disclosure meidante filtros LDAP era insuficiente y un atacante podr\u00eda ser capaz de obtener claves confidenciales de recuperaci\u00f3n de BitLocker desde un Samba AD DC."
    }
  ],
  "id": "CVE-2023-0614",
  "lastModified": "2025-02-13T15:15:12.557",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 4.0,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-04-03T23:15:06.957",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-0614.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-0614.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-312"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-12-02 01:15
Modified
2024-11-21 05:03
Summary
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
redhat enterprise_linux 8.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE63D07-2640-412A-82B5-24C7B08E4182",
              "versionEndExcluding": "4.11.15",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "163B1F95-F904-4C26-8E77-DEC708753D78",
              "versionEndExcluding": "4.12.9",
              "versionStartIncluding": "4.12.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "240B16EE-E139-40D2-BCB5-2A635031EC19",
              "versionEndExcluding": "4.13.1",
              "versionStartIncluding": "4.13.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in samba\u0027s DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo en el servidor DNS de samba.\u0026#xa0;Un usuario autenticado podr\u00eda usar este fallo para que el servidor RPC se bloquee.\u0026#xa0;Este servidor RPC, que tambi\u00e9n sirve protocolos distintos a dnsserver, ser\u00e1 reinciado despu\u00e9s de un breve retraso, pero es f\u00e1cil para un atacante no administrativo autenticado bloquearlo nuevamente tan pronto como regrese.\u0026#xa0;El servidor DNS de Samba seguir\u00e1 funcionando, pero muchos servicios RPC no"
    }
  ],
  "id": "CVE-2020-14383",
  "lastModified": "2024-11-21T05:03:08.590",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-12-02T01:15:12.170",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892636"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202012-24"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-14383.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1892636"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202012-24"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-14383.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-391"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-04-10 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2012/May/msg00001.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=133951282306605&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=133951282306605&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=134323086902585&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=134323086902585&w=2
secalert@redhat.comhttp://secunia.com/advisories/48751
secalert@redhat.comhttp://secunia.com/advisories/48754
secalert@redhat.comhttp://secunia.com/advisories/48816
secalert@redhat.comhttp://secunia.com/advisories/48818
secalert@redhat.comhttp://secunia.com/advisories/48844
secalert@redhat.comhttp://secunia.com/advisories/48873
secalert@redhat.comhttp://secunia.com/advisories/48879
secalert@redhat.comhttp://secunia.com/advisories/48999
secalert@redhat.comhttp://support.apple.com/kb/HT5281
secalert@redhat.comhttp://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2450
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:055
secalert@redhat.comhttp://www.samba.org/samba/history/samba-3.6.4.html
secalert@redhat.comhttp://www.securitytracker.com/id?1026913
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1423-1
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2012-1182Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2012/May/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=133951282306605&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=133951282306605&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=134323086902585&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=134323086902585&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48751
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48754
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48816
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48818
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48844
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48873
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48879
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48999
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT5281
af854a3a-2127-422b-91ae-364da2661108http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2450
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:055
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/history/samba-3.6.4.html
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1026913
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1423-1
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2012-1182Vendor Advisory
Impacted products
Vendor Product Version
samba samba *
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27
samba samba 3.0.27
samba samba 3.0.28
samba samba 3.0.28
samba samba 3.0.29
samba samba 3.0.30
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.0.34
samba samba 3.0.35
samba samba 3.0.36
samba samba 3.0.37
samba samba 3.1.0
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12
samba samba 3.2.13
samba samba 3.2.14
samba samba 3.2.15
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.3.8
samba samba 3.3.9
samba samba 3.3.10
samba samba 3.3.11
samba samba 3.3.12
samba samba 3.3.13
samba samba 3.3.14
samba samba 3.3.15
samba samba 3.3.16
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4
samba samba 3.4.5
samba samba 3.4.6
samba samba 3.4.7
samba samba 3.4.8
samba samba 3.4.9
samba samba 3.4.10
samba samba 3.4.11
samba samba 3.4.12
samba samba 3.4.13
samba samba 3.4.14
samba samba 3.5.0
samba samba 3.5.1
samba samba 3.5.2
samba samba 3.5.3
samba samba 3.5.4
samba samba 3.5.5
samba samba 3.5.6
samba samba 3.5.7
samba samba 3.5.8
samba samba 3.5.9
samba samba 3.5.10
samba samba 3.5.11
samba samba 3.5.12
samba samba 3.5.13
samba samba 3.6.0
samba samba 3.6.1
samba samba 3.6.2
samba samba 3.6.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "936BF59B-7485-4097-89D4-684CB63678BB",
              "versionEndIncluding": "3.4.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "A8CE218B-E64D-41DC-8CFD-9387427B72CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
              "matchCriteriaId": "9C2CDC66-8A44-4BEE-9574-FC69C38295A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
              "matchCriteriaId": "9AD55F6B-F753-41FC-8701-78A7DA556E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
              "matchCriteriaId": "0B63F362-A49C-401F-BE49-C6E1DC03E4F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
              "matchCriteriaId": "81F23C27-76CF-4906-B829-3B4F2E07900E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
              "matchCriteriaId": "EF6C8992-5210-483E-9EED-B7FC1EACA703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
              "matchCriteriaId": "EAF9C0EA-173A-4B02-9933-09DFAC31398D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "D87FDC2E-C6D9-4D10-BED6-B10C40232DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
              "matchCriteriaId": "A90CE26E-8993-49BA-91BF-536DBC44CAD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
              "matchCriteriaId": "33A9C2ED-355B-4903-ABC3-23C85B494053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
              "matchCriteriaId": "375BCF42-1A8A-4ACB-8198-FEA471A81B76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
              "matchCriteriaId": "C1C6E9D6-2964-4D63-9FCB-B4A02CC21975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
              "matchCriteriaId": "F8C1CA41-DBEF-46D7-9A94-930315BECACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
              "matchCriteriaId": "F6804F20-3B33-4FAA-ACC3-9658FF0770D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
              "matchCriteriaId": "0FFB13DF-53C5-4DF4-8D47-B40BD532E1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
              "matchCriteriaId": "49684CD5-4256-47CA-84BC-E319D8973314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
              "matchCriteriaId": "574ADE47-94CB-42A2-AE8E-A14FBB0EAFB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC56F11D-20DE-4399-AED1-DF42C7E62F97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "254D9460-899D-4D06-AC47-1914A42FC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "427DA06C-9F5C-4E9A-A39F-22CD5E4F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60CED3E-B7A6-4674-ADD5-A3B047C7D125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "07906A18-FD60-42A5-AC17-21F677EA1762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "A99F7DCF-CBD0-4BC1-9C07-F1CB807614BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFC3F99-11F6-496E-BF55-53CF1E012FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C93E46D-FDEA-4B59-8C84-8A3DCC6AB3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4633D2E-2CBE-4B92-AD35-ED57C5399ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F200FC8-DA2E-4D39-8FF7-423759307DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B7341D-B02F-405B-81A0-5F74CFA8F8E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207B352-D8F8-4E15-9507-D3AD10D56211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBA51B-159F-42E9-8A2C-2B9BF1EB7D98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8F01226-D9E6-460C-975A-618932D5F16F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD98764-741C-4FED-BE4D-446E8E8D31F9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8C2E40-DA05-4B50-AB29-398AF71EBECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E81ED-032F-42B7-9D50-15CADE337AD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDD90A4-B50B-4640-ADDE-B75BBC34507C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFC3804-991A-4BAF-818E-E321DB21FB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE1B4D9-507A-43B2-81F3-77E411ABEF7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "857FCD47-F720-4273-BF1D-D5DC95ECA6D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8FE4AC-6E71-44CF-902D-BACA830C4CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EE762A-F95F-42CF-BB80-B0EF81A438EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "738095D8-8ACE-4CF4-9D97-4228FC686F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4634FC-DA4E-4B1D-B1AB-A45D8235780D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA83A66-BD39-4560-8EAF-ADF2433EF36D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "406C2297-B58D-4623-9E7A-2C438ABBAC93",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call."
    },
    {
      "lang": "es",
      "value": "El generador de c\u00f3digo RPC de Samba 3.x anteriores a 3.4.16, 3.5.x anteriores a 3.5.14, y 3.6.x anteriores a 3.6.4 no implementa la validaci\u00f3n de una longitud de array de una manera consistente con la validaci\u00f3n de la reserva de memoria del array, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de una llamada RPC modificada."
    }
  ],
  "id": "CVE-2012-1182",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-04-10T21:55:02.203",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48751"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48754"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48816"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48818"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48844"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48873"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48879"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48999"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://support.apple.com/kb/HT5281"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2450"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:055"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.samba.org/samba/history/samba-3.6.4.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1026913"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1423-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2012-1182"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2012/May/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078258.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078726.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-April/078836.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/080567.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=133951282306605\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48751"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48754"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48816"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48818"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48844"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48873"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48999"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://support.apple.com/kb/HT5281"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2450"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:055"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/history/samba-3.6.4.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026913"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1423-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2012-1182"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-189"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-03-19 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
Samba 4.x before 4.0.4, when configured as an Active Directory domain controller, uses world-writable permissions on non-default CIFS shares, which allows remote authenticated users to read, modify, create, or delete arbitrary files via standard filesystem operations.
Impacted products
Vendor Product Version
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 4.x before 4.0.4, when configured as an Active Directory domain controller, uses world-writable permissions on non-default CIFS shares, which allows remote authenticated users to read, modify, create, or delete arbitrary files via standard filesystem operations."
    },
    {
      "lang": "es",
      "value": "Samba v4.x anterior a v4.0.4, cuando se configura como un controlador de dominio del Directorio ACtivo, utiliza permisos de escritura globales sobre CIFS shares que no est\u00e1n por defecto, lo que permite a usuarios autenticados remotamente leer, modificar, crear o eliminar archivos arbitrariamente a trav\u00e9s de operaciones convencionales en el sistema de archivos."
    }
  ],
  "id": "CVE-2013-1863",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-03-19T17:55:02.133",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-1863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-4.0.3-CVE-2013-1863.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-1863"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-09 22:15
Modified
2025-01-02 22:15
Summary
Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
              "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4455CF3A-CC91-4BE4-A7AB-929AC82E34F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "703773B3-EE5B-41F5-A2D9-B56F96B8793D",
              "versionEndExcluding": "4.15.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10AA6759-95FC-47A6-AA92-342893A2B23E",
              "versionEndExcluding": "4.16.8",
              "versionStartIncluding": "4.16.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E911B3-B4DD-451C-9579-74559328F89F",
              "versionEndExcluding": "4.17.4",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability"
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de elevaci\u00f3n de privilegios en Kerberos RC4-HMAC de Windows"
    }
  ],
  "id": "CVE-2022-37966",
  "lastModified": "2025-01-02T22:15:09.867",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "secure@microsoft.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-09T22:15:13.603",
  "references": [
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37966"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202309-06"
    }
  ],
  "sourceIdentifier": "secure@microsoft.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-01 21:15
Modified
2024-11-21 07:06
Summary
Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it.
Impacted products
Vendor Product Version
samba samba *
fedoraproject fedora 37



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3DD507-0A0D-4BB9-8789-FB6BBCDEB506",
              "versionStartIncluding": "4.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba does not validate the Validated-DNS-Host-Name right for the dNSHostName attribute which could permit unprivileged users to write it."
    },
    {
      "lang": "es",
      "value": "Samba no comprueba el derecho Validated-DNS-Host-Name para el atributo dNSHostName, lo que podr\u00eda permitir a usuarios no privilegiados escribirlo"
    }
  ],
  "id": "CVE-2022-32743",
  "lastModified": "2024-11-21T07:06:52.460",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-01T21:15:10.130",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14833"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory",
        "Vendor Advisory"
      ],
      "url": "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/5c578b15-d619-408d-ba17-380714b89fd1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTTOLTHUHOV4SHCHCB5TAA4FQVJAWN4P/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory",
        "Vendor Advisory"
      ],
      "url": "https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-adts/5c578b15-d619-408d-ba17-380714b89fd1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZTTOLTHUHOV4SHCHCB5TAA4FQVJAWN4P/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-25 18:15
Modified
2024-11-21 07:06
Summary
A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A97D622-0235-4890-A2AF-10C3E6010D32",
              "versionEndExcluding": "4.14.14",
              "versionStartIncluding": "4.13.14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E947A97-F159-4257-8197-13E8588C78A4",
              "versionEndExcluding": "4.15.9",
              "versionStartIncluding": "4.15.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8479455F-FFCD-46F1-B0E3-EBC082F89C16",
              "versionEndExcluding": "4.16.4",
              "versionStartIncluding": "4.16.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in Samba. Samba AD users can cause the server to access uninitialized data with an LDAP add or modify the request, usually resulting in a segmentation fault."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo en Samba. Los usuarios de AD de Samba pueden hacer que el servidor acceda a datos no inicializados con una solicitud de adici\u00f3n o modificaci\u00f3n de LDAP, resultando usualmente en un fallo de segmentaci\u00f3n."
    }
  ],
  "id": "CVE-2022-32745",
  "lastModified": "2024-11-21T07:06:52.710",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-25T18:15:10.563",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-32745.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-32745.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        },
        {
          "lang": "en",
          "value": "CWE-908"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-03-10 20:13
Modified
2025-04-11 00:51
Severity ?
Summary
The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2010-02/0083.html
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2010-02/0107.html
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2010-02/0108.html
cve@mitre.orghttp://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html
cve@mitre.orghttp://gitweb.samba.org/?p=samba.git%3Ba=commit%3Bh=bd269443e311d96ef495a9db47d1b95eb83bb8f4
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
cve@mitre.orghttp://marc.info/?l=full-disclosure&m=126538598820903&w=2
cve@mitre.orghttp://marc.info/?l=oss-security&m=126539592603079&w=2
cve@mitre.orghttp://marc.info/?l=oss-security&m=126540402215620&w=2
cve@mitre.orghttp://marc.info/?l=oss-security&m=126540733320471&w=2
cve@mitre.orghttp://marc.info/?l=oss-security&m=126545363428745&w=2
cve@mitre.orghttp://marc.info/?l=oss-security&m=126777580624790&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126539387432412&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126540011609753&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126540100511357&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126540248613395&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126540277713815&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126540290614053&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126540376915283&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126540475116511&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126540477016522&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126540539117328&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126540608318301&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126540695819735&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126547903723628&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126548356728379&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126549111204428&w=2
cve@mitre.orghttp://marc.info/?l=samba-technical&m=126555346721629&w=2
cve@mitre.orghttp://secunia.com/advisories/39317
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2010/02/06/3
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2010/03/05/3
cve@mitre.orghttp://www.samba.org/samba/news/symlink_attack.htmlVendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=562568
cve@mitre.orghttps://bugzilla.samba.org/show_bug.cgi?id=7104
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0083.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0107.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0108.html
af854a3a-2127-422b-91ae-364da2661108http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html
af854a3a-2127-422b-91ae-364da2661108http://gitweb.samba.org/?p=samba.git%3Ba=commit%3Bh=bd269443e311d96ef495a9db47d1b95eb83bb8f4
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=full-disclosure&m=126538598820903&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=126539592603079&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=126540402215620&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=126540733320471&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=126545363428745&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=oss-security&m=126777580624790&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126539387432412&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126540011609753&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126540100511357&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126540248613395&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126540277713815&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126540290614053&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126540376915283&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126540475116511&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126540477016522&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126540539117328&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126540608318301&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126540695819735&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126547903723628&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126548356728379&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126549111204428&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-technical&m=126555346721629&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39317
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/02/06/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2010/03/05/3
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/news/symlink_attack.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=562568
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=7104
Impacted products
Vendor Product Version
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.3.8
samba samba 3.3.9
samba samba 3.3.10
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4
samba samba 3.4.5
samba samba 3.5.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options."
    },
    {
      "lang": "es",
      "value": "La configuraci\u00f3n por defecto de smbd en Samba en versiones anteriores a v3.3.11, v3.4.x anteriores a v3.4.6, y v3.5.x anteriores a v3.5.0rc3, cuando existe una carpeta compartida, permite a usuarios remotos autenticados utilizar una vulnerabilidad de salto de directorio y acceder a ficheros de forma arbitraria, mediante el uso de un comando de enlace simb\u00f3lico en smbclient para crear un enlace simb\u00f3lico que contenga secuencias .. (punto punto), relacionado con la combinaci\u00f3n de extensiones unix y opciones amplias de enlaces."
    }
  ],
  "id": "CVE-2010-0926",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-03-10T20:13:04.090",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0083.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0107.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0108.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://gitweb.samba.org/?p=samba.git%3Ba=commit%3Bh=bd269443e311d96ef495a9db47d1b95eb83bb8f4"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=full-disclosure\u0026m=126538598820903\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=oss-security\u0026m=126539592603079\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=oss-security\u0026m=126540402215620\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=oss-security\u0026m=126540733320471\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=oss-security\u0026m=126545363428745\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=oss-security\u0026m=126777580624790\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126539387432412\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540011609753\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540100511357\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540248613395\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540277713815\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540290614053\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540376915283\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540475116511\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540477016522\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540539117328\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540608318301\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540695819735\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126547903723628\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126548356728379\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126549111204428\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=samba-technical\u0026m=126555346721629\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/39317"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2010/02/06/3"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2010/03/05/3"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/news/symlink_attack.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=562568"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=7104"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0107.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-02/0108.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://blog.metasploit.com/2010/02/exploiting-samba-symlink-traversal.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://gitweb.samba.org/?p=samba.git%3Ba=commit%3Bh=bd269443e311d96ef495a9db47d1b95eb83bb8f4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=full-disclosure\u0026m=126538598820903\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=126539592603079\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=126540402215620\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=126540733320471\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=126545363428745\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=oss-security\u0026m=126777580624790\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126539387432412\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540011609753\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540100511357\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540248613395\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540277713815\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540290614053\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540376915283\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540475116511\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540477016522\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540539117328\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540608318301\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126540695819735\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126547903723628\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126548356728379\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126549111204428\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=samba-technical\u0026m=126555346721629\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39317"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/02/06/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/03/05/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/news/symlink_attack.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=562568"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=7104"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-06-25 01:30
Modified
2025-04-09 00:30
Severity ?
Summary
The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory.
References
secalert@redhat.comhttp://secunia.com/advisories/35539Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/35573Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/35606Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/36918Third Party Advisory
secalert@redhat.comhttp://wiki.rpath.com/Advisories:rPSA-2009-0145Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2009/dsa-1823Third Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:196Third Party Advisory
secalert@redhat.comhttp://www.samba.org/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patchExploit, Patch, Vendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patchPatch, Vendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patchPatch, Vendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2009-1888.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/507856/100/0/threadedThird Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/bid/35472Exploit, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id?1022442Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.521591Third Party Advisory
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-839-1Third Party Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/1664Permissions Required, Third Party Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/51327Third Party Advisory, VDB Entry
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10790Third Party Advisory
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7292Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35539Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35573Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35606Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36918Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2009-0145Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1823Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:196Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patchExploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patchPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patchPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2009-1888.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/507856/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/35472Exploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022442Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.521591Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-839-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1664Permissions Required, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/51327Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10790Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7292Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC3937D6-7AD9-4319-92E9-C6A01927A167",
              "versionEndIncluding": "3.0.35",
              "versionStartIncluding": "3.0.31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D1C58C8-7E57-4C73-9C6D-5A8512A31276",
              "versionEndExcluding": "3.2.13",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2425AB5F-EB80-45AF-88CA-4A1A29824BF4",
              "versionEndExcluding": "3.3.6",
              "versionStartIncluding": "3.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:lts:*:*:*",
              "matchCriteriaId": "5C18C3CD-969B-4AA3-AE3A-BA4A188F8BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "C91D2DBF-6DA7-4BA2-9F29-8BD2725A4701",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n acl_group_override en smbd/posix_acls.c en smbd en Samba v3.0.x anterior a v3.0.35, v3.1.x y v3.2.x anterior a v3.2.13, y v3.3.x anterior 3.3.6, cuando el modo de fichero dos est\u00e1 habilitado, permite a atacantes remotos modificar la lista de control de acceso para ficheros a trav\u00e9s de vectores relacionados con acceso de lectura a memoria sin inicializar."
    }
  ],
  "id": "CVE-2009-1888",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-06-25T01:30:01.750",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35539"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35573"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35606"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/36918"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1823"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:196"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2009-1888.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/35472"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1022442"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.521591"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-839-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1664"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51327"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10790"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7292"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35539"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35573"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/35606"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/36918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1823"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:196"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.0.34-CVE-2009-1888.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.2.12-CVE-2009-1888.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.3.5-CVE-2009-1888.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2009-1888.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/35472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1022442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.521591"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-839-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1664"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10790"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7292"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "This issue did not affect Red Hat Enterprise Linux 3.\n\nIt was addressed in Red Hat Enterprise Linux 4 and 5 via RHSA-2009:1529:\nhttps://rhn.redhat.com/errata/RHSA-2009-1529.html\n",
      "lastModified": "2009-10-27T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-28 04:58
Modified
2025-04-12 10:46
Severity ?
Summary
The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103.
Impacted products
Vendor Product Version
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49235CF9-9463-4408-9747-C37CE719E437",
              "versionEndExcluding": "4.0.18",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC0F01F-2023-47CE-9661-A8E2A0FD4E92",
              "versionEndExcluding": "4.1.8",
              "versionStartIncluding": "4.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The internal DNS server in Samba 4.x before 4.0.18 does not check the QR field in the header section of an incoming DNS message before sending a response, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged response packet that triggers a communication loop, a related issue to CVE-1999-0103."
    },
    {
      "lang": "es",
      "value": "El servidor DNS interno en Samba 4.x anterior a 4.0.18 no comprueba el campo QR en la secci\u00f3n de cabecera de un mensaje DNS entrante antes de enviar una respuesta, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (consumo de CPU y ancho de banda) a trav\u00e9s de un paquete de respuestas falsificado que provoca un bucle de comunicaci\u00f3n, un problema relacionado con CVE-1999-0103."
    }
  ],
  "id": "CVE-2014-0239",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-28T04:58:32.750",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/59579"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2014-0239"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/67691"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1030309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/59579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2014-0239"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/67691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1030309"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-11-03 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873Patch, Vendor Advisory
cve@mitre.orghttp://marc.info/?l=bugtraq&m=109655827913457&w=2
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-66-200529-1
cve@mitre.orghttp://us4.samba.org/samba/news/#security_2.2.12
cve@mitre.orghttp://www.debian.org/security/2004/dsa-600Patch, Vendor Advisory
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=146&type=vulnerabilities&flashstatus=trueExploit, Vendor Advisory
cve@mitre.orghttp://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:104
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2004_35_samba.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2004-498.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/377618
cve@mitre.orghttp://www.securityfocus.com/bid/11281Patch, Vendor Advisory
cve@mitre.orghttp://www.trustix.org/errata/2004/0051/
cve@mitre.orghttps://bugzilla.fedora.us/show_bug.cgi?id=2102
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/17556
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000873Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=109655827913457&w=2
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-200529-1
af854a3a-2127-422b-91ae-364da2661108http://us4.samba.org/samba/news/#security_2.2.12
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2004/dsa-600Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=146&type=vulnerabilities&flashstatus=trueExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:104
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2004_35_samba.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2004-498.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/377618
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11281Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2004/0051/
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.fedora.us/show_bug.cgi?id=2102
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/17556
Impacted products
Vendor Product Version
samba samba 2.2.0
samba samba 2.2.0a
samba samba 2.2.1a
samba samba 2.2.2
samba samba 2.2.3
samba samba 2.2.3a
samba samba 2.2.4
samba samba 2.2.5
samba samba 2.2.6
samba samba 2.2.7
samba samba 2.2.7a
samba samba 2.2.8
samba samba 2.2.8a
samba samba 2.2.9
samba samba 2.2.11
samba samba 2.2a
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65AC9643-E1A5-4013-9607-17C6CC7CC63B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "090E2541-2DBA-41CB-A792-9E703C797949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F65FF3-71F8-4278-A823-A6E0FF65D9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C71CB60-2689-4A4A-9509-E2F3135E6491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0129E404-3AE8-4F0E-89CB-7F2FA5B47011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "614547F5-9C3F-489B-9B72-91B0FF646CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A052141C-874D-4ED0-99FB-D7468FACFC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9739EA65-9FA8-425E-B355-E690773D5B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B618F94-DAC2-4A97-9F7F-8BCEA3199769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE7C057-B024-4417-B572-5D396366620E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DC3500-F8F0-46E1-B0AA-C2474CCB3DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFCD334C-FB95-41A6-8F4C-FCC4E70CE930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "75C86202-3150-440C-B048-BB039E9D3606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CAF474-0C3A-4E49-8CF8-9DF14D84CDCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92304DE-CFBB-4C03-AA7F-54DB3C14ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC2AE5A9-62C5-4DCE-85B3-16F48695B3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via \"/.////\" style sequences in pathnames."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n unix_clena_name en Samba 2.2.x a 2.2.11, y 3.0.x anterirores a 3.0.2a, recorta ciertos nombres de directorio a sus rutas absolutas, lo que podr\u00eda permitir a atacantes evitar la restricticiones de espeficadas de lectura, ejecuci\u00f3n y listado de carpetas compartidas mediante secuencias del estilo \"/.////\" en rutas."
    }
  ],
  "id": "CVE-2004-0815",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-11-03T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=109655827913457\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200529-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://us4.samba.org/samba/news/#security_2.2.12"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-600"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=146\u0026type=vulnerabilities\u0026flashstatus=true"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:104"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2004_35_samba.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-498.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/377618"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11281"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2004/0051/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2102"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17556"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000873"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=109655827913457\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101584-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57664-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200529-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://us4.samba.org/samba/news/#security_2.2.12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-600"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=146\u0026type=vulnerabilities\u0026flashstatus=true"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:104"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2004_35_samba.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2004-498.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/377618"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/11281"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2004/0051/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.fedora.us/show_bug.cgi?id=2102"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17556"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-12-19 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Samba Web Administration Tool (SWAT) in Samba 2.0.7 supplies a different error message when a valid username is provided versus an invalid name, which allows remote attackers to identify valid users on the server.
Impacted products
Vendor Product Version
samba samba 2.0.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CB46ABA-F403-4715-915D-870BD221C8FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 supplies a different error message when a valid username is provided versus an invalid name, which allows remote attackers to identify valid users on the server."
    }
  ],
  "id": "CVE-2000-0938",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-12-19T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5442"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-06-17 16:30
Modified
2025-04-11 00:51
Severity ?
Summary
The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value.
References
secalert@redhat.comhttp://git.samba.org/?p=samba.git%3Ba=commit%3Bh=25452a2268ac7013da28125f3df22085139af12d
secalert@redhat.comhttp://samba.org/samba/history/samba-3.4.8.html
secalert@redhat.comhttp://samba.org/samba/history/samba-3.5.2.html
secalert@redhat.comhttp://security-tracker.debian.org/tracker/CVE-2010-1635
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:141
secalert@redhat.comhttp://www.securityfocus.com/bid/40097Exploit
secalert@redhat.comhttp://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1933
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=594921
secalert@redhat.comhttps://bugzilla.samba.org/show_bug.cgi?id=7229
af854a3a-2127-422b-91ae-364da2661108http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=25452a2268ac7013da28125f3df22085139af12d
af854a3a-2127-422b-91ae-364da2661108http://samba.org/samba/history/samba-3.4.8.html
af854a3a-2127-422b-91ae-364da2661108http://samba.org/samba/history/samba-3.5.2.html
af854a3a-2127-422b-91ae-364da2661108http://security-tracker.debian.org/tracker/CVE-2010-1635
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:141
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/40097Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1933
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=594921
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=7229
Impacted products
Vendor Product Version
samba samba *
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27
samba samba 3.0.27a
samba samba 3.0.28
samba samba 3.0.28a
samba samba 3.0.29
samba samba 3.0.30
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.0.34
samba samba 3.0.35
samba samba 3.0.36
samba samba 3.0.37
samba samba 3.1.0
samba samba 3.2
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12
samba samba 3.2.13
samba samba 3.2.14
samba samba 3.2.15
samba samba 3.3
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.3.8
samba samba 3.3.9
samba samba 3.3.10
samba samba 3.3.11
samba samba 3.4
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4
samba samba 3.4.5
samba samba 3.4.6
samba samba 3.5
samba samba 3.5.0
samba samba 3.5.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6627F8F-50B7-48B7-A071-BEDABD089C15",
              "versionEndIncluding": "3.4.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC24403-E706-4073-A04D-53E1B79B59B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3AA114-63C8-4B25-86BA-73C6933EE21F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC56F11D-20DE-4399-AED1-DF42C7E62F97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE530BB9-A3ED-4EBB-B8E5-86D4CC5A8C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9E86C9-14FE-4C55-A08F-9A0C555260ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "254D9460-899D-4D06-AC47-1914A42FC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCD3046-85BB-40A6-A898-774833033891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C705F9A-BEA3-40F9-AC9D-730F3A704731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The chain_reply function in process.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) via a Negotiate Protocol request with a certain 0x0003 field value followed by a Session Setup AndX request with a certain 0x8003 field value."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n chain_reply de process.c de smbd de Samba anterior a v3.4.8, y v3.5.x anterior a v3.5.2 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (referencia a puntero nulo -NULL- y ca\u00edda del proceso) mediante una solicitud de negociaci\u00f3n de protocolo (Negotiate Protocol) con determinado valor de campo 0x003 seguido de una solicitud Session Setup AndX con determinado valor de campo 0x8003."
    }
  ],
  "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/476.html\r\n\r\n\u0027NULL Pointer Dereference\u0027",
  "id": "CVE-2010-1635",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-06-17T16:30:01.840",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=25452a2268ac7013da28125f3df22085139af12d"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://samba.org/samba/history/samba-3.4.8.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://samba.org/samba/history/samba-3.5.2.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security-tracker.debian.org/tracker/CVE-2010-1635"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:141"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/40097"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1933"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594921"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=7229"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=25452a2268ac7013da28125f3df22085139af12d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://samba.org/samba/history/samba-3.4.8.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://samba.org/samba/history/samba-3.5.2.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security-tracker.debian.org/tracker/CVE-2010-1635"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:141"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/40097"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1933"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594921"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=7229"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-03-13 22:59
Modified
2025-04-12 10:46
Summary
The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record.
Impacted products
Vendor Product Version
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.0.11
samba samba 4.0.12
samba samba 4.0.13
samba samba 4.0.14
samba samba 4.0.15
samba samba 4.0.16
samba samba 4.0.17
samba samba 4.0.18
samba samba 4.0.19
samba samba 4.0.20
samba samba 4.0.21
samba samba 4.0.22
samba samba 4.0.23
samba samba 4.0.24
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.1.6
samba samba 4.1.7
samba samba 4.1.8
samba samba 4.1.9
samba samba 4.1.10
samba samba 4.1.11
samba samba 4.1.12
samba samba 4.1.13
samba samba 4.1.14
samba samba 4.1.15
samba samba 4.1.16
samba samba 4.1.17
samba samba 4.1.18
samba samba 4.1.19
samba samba 4.1.20
samba samba 4.1.21
samba samba 4.1.22
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.1
samba samba 4.2.2
samba samba 4.2.3
samba samba 4.2.4
samba samba 4.2.5
samba samba 4.2.6
samba samba 4.2.7
samba samba 4.2.8
samba samba 4.3.0
samba samba 4.3.1
samba samba 4.3.2
samba samba 4.3.3
samba samba 4.3.4
samba samba 4.3.5
samba samba 4.4.0
samba samba 4.4.0
samba samba 4.4.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E0C61-7718-4DBC-8F02-6F3C2CBE1783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "324AE9D7-C41F-493E-A1AD-FCD869D29D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "68519B1F-F315-4BBD-A4A3-4E1956D81E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF745E93-A92E-4AD7-8D42-36E9387C6915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4B760-417E-45D1-9CE1-AEBC8936BDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0DA221-078A-49DC-B0F1-F318FD785664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72BCA7B-6338-4A7C-AE71-E0B8F6C9F2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8F6AB9-A6C4-443E-A846-EE845BE24F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C8F7D7-BAAD-4F3A-BA39-44BE0CCADFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC522377-A6CD-4513-83B4-9ADC15F76B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC4595-5699-4237-BCD7-FD233BA1AECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44BD172-80FA-4260-BAFB-251A95E8C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09116D2-F168-4305-9A1D-88A1D42739A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "558E0B71-F79E-47B5-90CC-9C165BB15507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D7E102-DD54-43F2-B008-66F7C243477E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8066AB8C-1AE6-4DA3-91DB-4BF67DBBA279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A03CB9E-DEFC-4507-A314-5E0824A66462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6708D6E-2098-432D-820A-853032BD9A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "42BA346B-F7C6-4EB3-91BD-2CCC2B688AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B689AA-2074-4E9A-93BD-F910510A29AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF22E49-B259-4E13-B371-0C0173E534FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE5C0A8F-A502-4BC1-AC8A-45AE1D16371D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73876B7-A758-40CB-919D-6720AA7B9564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "84925F68-F440-4677-B3DF-F87EAC39E235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC0A0B3C-C011-4F27-BE8D-5A89BFC93F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7792A65-DB6E-49F4-9447-021EA9A82697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF3B982-B094-4B54-84A2-4CA199EE4E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6811F5-DDCA-4AED-9BF9-4C71550A727D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AE10A1EF-F9CE-4126-9793-FB70A1D512A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7FA4DD6C-1531-420A-B271-EB16EA05470B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "AB6AEA9D-42C8-4C60-86AE-54DB2940A3B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2F221BF0-7B2B-4676-B8F2-2705C05B4034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C395C0-160C-4D8A-A3B6-7E30DD8721EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17EC5DF-2F00-479B-9775-45DA569BCED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CC31CBA-10A4-417C-A381-2BB7A68CE0D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D07800-4CCD-4B98-8D41-778295D1A3A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C4D3BA-781F-4C96-9234-73DB1593C7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AACDFB6-841E-42A5-AA8D-58E8A38D11D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD43D2C5-26D5-41AC-BC20-FACB68D22F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D186867E-18D6-4960-B8BE-A4353D941357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8643B45-1CE3-492F-BD82-65801F6C6FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F009D18-204C-4E6D-9827-9FBA9A4FFBA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "158DC9D2-2264-48B6-9116-CE6F0138D7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4339B46-E92A-4F7C-A0BA-62D7F7C428DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3D5E50-874B-48AE-B7C0-264DA0531847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "60C0F5A3-DB13-4BAC-B633-7E7F54FE34FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "85877BF1-8B16-4FED-8CDD-3EE9E1999BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "02A189FF-0E20-4F84-8935-C218F5ED126B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "55F79F4D-6C85-4388-B7C4-C07AB5502A0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The internal DNS server in Samba 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4, when an AD DC is configured, allows remote authenticated users to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory by uploading a crafted DNS TXT record."
    },
    {
      "lang": "es",
      "value": "El servidor DNS interno en Samba 4.x en versiones anteriores a 4.1.23, 4.2.x en versiones anteriores a 4.2.9, 4.3.x en versiones anteriores a 4.3.6 y 4.4.x en versiones anteriores a 4.4.0rc4, cuando est\u00e1 configurado un AD DC permite a usuarios remotos autenticados causar una denegaci\u00f3n de servicio (lectura fuera de rango) o posiblemente obtener informaci\u00f3n sensible de la memoria de proceso cargando un registro DNS TXT manipulado."
    }
  ],
  "id": "CVE-2016-0771",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.9,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 4.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-03-13T22:59:01.797",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2016/dsa-3514"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/84273"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1035219"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2922-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=11128"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=11686"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-0771.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3514"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/84273"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2922-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=11128"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=11686"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-0771.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-05-11 14:29
Modified
2025-04-20 01:37
Summary
Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions.
References
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2017-0494.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2017-0495.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2017-0662.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2017-0744.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/94994Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1037495Third Party Advisory, VDB Entry
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2017:1265Third Party Advisory
secalert@redhat.comhttps://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2016-2126.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0494.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0495.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0662.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0744.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/94994Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1037495Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1265Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2016-2126.htmlVendor Advisory
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFC5F77B-9D76-42B9-BB16-CA3A2DD00766",
              "versionEndExcluding": "4.3.13",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A963A86-CAF4-4882-B9DC-E9C7CDA2764C",
              "versionEndExcluding": "4.4.8",
              "versionStartIncluding": "4.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6044E13A-532E-403E-AA23-4A77771D2094",
              "versionEndExcluding": "4.5.3",
              "versionStartIncluding": "4.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba version 4.0.0 up to 4.5.2 is vulnerable to privilege elevation due to incorrect handling of the PAC (Privilege Attribute Certificate) checksum. A remote, authenticated, attacker can cause the winbindd process to crash using a legitimate Kerberos ticket. A local service with access to the winbindd privileged pipe can cause winbindd to cache elevated access permissions."
    },
    {
      "lang": "es",
      "value": "Samba versiones 4.0.0 hasta 4.5.2, es vulnerable a la elevaci\u00f3n de privilegios debido al manejo incorrecto de la suma de comprobaci\u00f3n PAC (Certificado de Atributo de Privilegio). Un atacante autenticado y remoto puede hacer que el proceso winbindd se bloquee usando un ticket de Kerberos leg\u00edtimo. Un servicio local con acceso a la tuber\u00eda con privilegios de winbindd puede hacer que winbindd almacene en cach\u00e9 los permisos de acceso elevados."
    }
  ],
  "id": "CVE-2016-2126",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-05-11T14:29:58.077",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94994"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1037495"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1265"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2126.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94994"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1037495"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1265"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA43730"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2126.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-08-27 20:41
Modified
2025-04-09 00:30
Severity ?
Summary
Samba 3.2.0 uses weak permissions (0666) for the (1) group_mapping.tdb and (2) group_mapping.ldb files, which allows local users to modify the membership of Unix groups.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073Issue Tracking, Third Party Advisory
cve@mitre.orghttp://samba.org/samba/security/CVE-2008-3789.htmlVendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31601Not Applicable, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/08/26/2Mailing List, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/30837Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id?1020770Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2440Permissions Required, Third Party Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44678Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://samba.org/samba/security/CVE-2008-3789.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31601Not Applicable, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/08/26/2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30837Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020770Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2440Permissions Required, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44678Third Party Advisory, VDB Entry
Impacted products
Vendor Product Version
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5F8589D-6057-4038-8EE3-B1024C63D234",
              "versionEndExcluding": "3.2.3",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 3.2.0 uses weak permissions (0666) for the (1) group_mapping.tdb and (2) group_mapping.ldb files, which allows local users to modify the membership of Unix groups."
    },
    {
      "lang": "es",
      "value": "Samba 3.2.0 usa permisos d\u00e9biles (0666) para los archivos (1) group_mapping.tdb y (2) group_mapping.ldb, lo que permite a usuarios locales modificar la pertenencia a los Grupos Unix."
    }
  ],
  "id": "CVE-2008-3789",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-08-27T20:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://samba.org/samba/security/CVE-2008-3789.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable",
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31601"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/08/26/2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/30837"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1020770"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2440"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44678"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496073"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://samba.org/samba/security/CVE-2008-3789.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable",
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/31601"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/08/26/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/30837"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1020770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2440"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44678"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions of samba as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.",
      "lastModified": "2008-08-28T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-20 15:15
Modified
2024-12-06 11:15
Summary
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
References
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:4325Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:4328Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/security/cve/CVE-2023-3347Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=2222792Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2023-3347.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:4325Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:4328Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/CVE-2023-3347Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2222792Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20230731-0010/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5477
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2023-3347.htmlVendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A197EF-100E-4683-AA59-E0855CBCE38B",
              "versionEndExcluding": "4.17.10",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55333C2A-E0E6-40A7-B655-93F05D6745AD",
              "versionEndExcluding": "4.18.5",
              "versionStartIncluding": "4.18.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "379A5883-F6DF-41F5-9403-8D17F6605737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability was found in Samba\u0027s SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured \"server signing = required\" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data."
    }
  ],
  "id": "CVE-2023-3347",
  "lastModified": "2024-12-06T11:15:06.970",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-20T15:15:11.940",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:4325"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:4328"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-3347"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222792"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-3347.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:4325"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:4328"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-3347"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222792"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20230731-0010/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2023/dsa-5477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-3347.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-347"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-924"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-09 22:15
Modified
2025-01-02 22:15
Summary
Windows Kerberos Elevation of Privilege Vulnerability



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
              "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4455CF3A-CC91-4BE4-A7AB-929AC82E34F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "703773B3-EE5B-41F5-A2D9-B56F96B8793D",
              "versionEndExcluding": "4.15.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10AA6759-95FC-47A6-AA92-342893A2B23E",
              "versionEndExcluding": "4.16.8",
              "versionStartIncluding": "4.16.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96E911B3-B4DD-451C-9579-74559328F89F",
              "versionEndExcluding": "4.17.4",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Windows Kerberos Elevation of Privilege Vulnerability"
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de elevaci\u00f3n de privilegios de Kerberos en Windows"
    }
  ],
  "id": "CVE-2022-37967",
  "lastModified": "2025-01-02T22:15:10.010",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "secure@microsoft.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-09T22:15:14.590",
  "references": [
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-37967"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202309-06"
    }
  ],
  "sourceIdentifier": "secure@microsoft.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-06-23 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2014-0279.html
secalert@redhat.comhttp://linux.oracle.com/errata/ELSA-2014-0866.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0866.html
secalert@redhat.comhttp://secunia.com/advisories/59378
secalert@redhat.comhttp://secunia.com/advisories/59407
secalert@redhat.comhttp://secunia.com/advisories/59433
secalert@redhat.comhttp://secunia.com/advisories/59579
secalert@redhat.comhttp://secunia.com/advisories/59834
secalert@redhat.comhttp://secunia.com/advisories/59848
secalert@redhat.comhttp://secunia.com/advisories/59919
secalert@redhat.comhttp://secunia.com/advisories/61218
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201502-15.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2014:136
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:082
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2014-0244Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/532757/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/68148
secalert@redhat.comhttp://www.securitytracker.com/id/1030455
secalert@redhat.comhttps://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1097815
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2014-0279.html
af854a3a-2127-422b-91ae-364da2661108http://linux.oracle.com/errata/ELSA-2014-0866.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0866.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59378
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59407
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59433
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59579
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59834
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59848
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/59919
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61218
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201502-15.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2014:136
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:082
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2014-0244Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/532757/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/68148
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1030455
af854a3a-2127-422b-91ae-364da2661108https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1097815
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
Impacted products
Vendor Product Version
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.1.6
samba samba 4.1.7
samba samba 4.1.8
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.0.11
samba samba 4.0.12
samba samba 4.0.13
samba samba 4.0.14
samba samba 4.0.15
samba samba 4.0.16
samba samba 4.0.17
samba samba 4.0.18
samba samba 3.6.0
samba samba 3.6.1
samba samba 3.6.2
samba samba 3.6.3
samba samba 3.6.4
samba samba 3.6.5
samba samba 3.6.6
samba samba 3.6.7
samba samba 3.6.8
samba samba 3.6.9
samba samba 3.6.10
samba samba 3.6.11
samba samba 3.6.12
samba samba 3.6.13
samba samba 3.6.14
samba samba 3.6.15
samba samba 3.6.16
samba samba 3.6.17
samba samba 3.6.18
samba samba 3.6.19
samba samba 3.6.20
samba samba 3.6.21
samba samba 3.6.22
samba samba 3.6.23



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44BD172-80FA-4260-BAFB-251A95E8C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09116D2-F168-4305-9A1D-88A1D42739A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "558E0B71-F79E-47B5-90CC-9C165BB15507",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E0C61-7718-4DBC-8F02-6F3C2CBE1783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "324AE9D7-C41F-493E-A1AD-FCD869D29D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "68519B1F-F315-4BBD-A4A3-4E1956D81E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF745E93-A92E-4AD7-8D42-36E9387C6915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4B760-417E-45D1-9CE1-AEBC8936BDA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "406C2297-B58D-4623-9E7A-2C438ABBAC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6AF0DD4-08D4-4726-8A12-E979FF3322B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F98DE75F-84AD-42EE-B9DA-8AFF22D2BF3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3DAE05B-9086-4702-9586-77B34399E1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA544013-8FAC-4452-9D38-081C514E2981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DE15C9-3308-4DE0-8048-9B06AF4D7343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CB4968-F331-4653-8B9F-75BA4BB7A6D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3470D075-CCF2-42A1-A8C9-E375FC05FF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA72F88-6799-4E6C-B73C-C92616B04661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF17CB71-6E46-4A1E-9EAB-7D2E182D56C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E7FA486-73CE-4226-86C6-DA8383C5578F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17D2B72-19E2-4DE6-B1E3-F1823E2690BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC6922A-03CD-484A-BF40-F8F937428062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "8470C251-2874-4047-A759-F8D5C6D5C755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "332308A1-4BA4-4BC7-8B4B-7463CF98B664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7DEA84-27E5-4CF0-AC2A-B128BB5AE199",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "455B73D1-E8F1-478C-8CEB-79E4B5F33A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC49023-CAD6-4875-BF94-EEC290E8A5A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42BFAF8-5822-4782-B60D-BCB131834419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1FD9EF-A863-48C6-8471-AB1D80B3C1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B8A690-81D0-40C4-9301-CF1992C2DA0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The sys_recvfrom function in nmbd in Samba 3.6.x before 3.6.24, 4.0.x before 4.0.19, and 4.1.x before 4.1.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed UDP packet."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n sys_recvfrom en nmbd en Samba 3.6.x anterior a 3.6.24, 4.0.x anterior a 4.0.19 y 4.1.x anterior a 4.1.9 permite a atacantes remotos causar una denegaci\u00f3n de servicio (bucle infinito y consumo de CPU) a trav\u00e9s de un paquete UDP malformado."
    }
  ],
  "id": "CVE-2014-0244",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-06-23T14:55:05.277",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://advisories.mageia.org/MGASA-2014-0279.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59378"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59407"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59433"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59579"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59834"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59848"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/59919"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/61218"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2014-0244"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/68148"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1030455"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1097815"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://advisories.mageia.org/MGASA-2014-0279.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://linux.oracle.com/errata/ELSA-2014-0866.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0866.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59378"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59407"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59433"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59848"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/59919"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61218"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:136"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2014-0244"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/532757/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/68148"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1030455"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://blogs.oracle.com/sunsecurity/entry/multiple_vulnerabilities_in_samba1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1097815"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-12-19 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Samba Web Administration Tool (SWAT) in Samba 2.0.7 allows remote attackers to cause a denial of service by repeatedly submitting a nonstandard URL in the GET HTTP request and forcing it to restart.
Impacted products
Vendor Product Version
samba samba 2.0.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CB46ABA-F403-4715-915D-870BD221C8FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 allows remote attackers to cause a denial of service by repeatedly submitting a nonstandard URL in the GET HTTP request and forcing it to restart."
    }
  ],
  "id": "CVE-2000-0939",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-12-19T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5444"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5444"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-09-06 16:55
Modified
2025-04-11 00:51
Severity ?
Summary
The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs in Samba 3.5.10 and earlier does not properly verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0547.
References
secalert@redhat.comhttp://comments.gmane.org/gmane.linux.kernel.cifs/3827Patch
secalert@redhat.comhttp://git.samba.org/?p=cifs-utils.git%3Ba=commit%3Bh=1e7a32924b22d1f786b6f490ce8590656f578f91
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/07/29/9Patch
secalert@redhat.comhttp://secunia.com/advisories/45798Vendor Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:148
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-1220.htmlVendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-1221.htmlVendor Advisory
secalert@redhat.comhttp://www.securitytracker.com/id?1025984
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=726691Patch
af854a3a-2127-422b-91ae-364da2661108http://comments.gmane.org/gmane.linux.kernel.cifs/3827Patch
af854a3a-2127-422b-91ae-364da2661108http://git.samba.org/?p=cifs-utils.git%3Ba=commit%3Bh=1e7a32924b22d1f786b6f490ce8590656f578f91
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/07/29/9Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45798Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:148
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-1220.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-1221.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1025984
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=726691Patch
Impacted products
Vendor Product Version
samba samba *
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 2.0
samba samba 2.0.0
samba samba 2.0.1
samba samba 2.0.2
samba samba 2.0.3
samba samba 2.0.4
samba samba 2.0.5
samba samba 2.0.5
samba samba 2.0.5a
samba samba 2.0.6
samba samba 2.0.7
samba samba 2.0.8
samba samba 2.0.9
samba samba 2.0.10
samba samba 2.2
samba samba 2.2.0
samba samba 2.2.0
samba samba 2.2.0a
samba samba 2.2.1
samba samba 2.2.1
samba samba 2.2.1a
samba samba 2.2.2
samba samba 2.2.3
samba samba 2.2.3
samba samba 2.2.3a
samba samba 2.2.4
samba samba 2.2.5
samba samba 2.2.6
samba samba 2.2.7
samba samba 2.2.7
samba samba 2.2.7a
samba samba 2.2.8
samba samba 2.2.8
samba samba 2.2.8a
samba samba 2.2.9
samba samba 2.2.10
samba samba 2.2.11
samba samba 2.2.12
samba samba 2.2a
samba samba 2.18.3
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27
samba samba 3.0.27
samba samba 3.0.28
samba samba 3.0.28
samba samba 3.0.29
samba samba 3.0.30
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.0.34
samba samba 3.0.35
samba samba 3.0.36
samba samba 3.0.37
samba samba 3.1.0
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12
samba samba 3.2.13
samba samba 3.2.14
samba samba 3.2.15
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.3.8
samba samba 3.3.9
samba samba 3.3.10
samba samba 3.3.11
samba samba 3.3.12
samba samba 3.3.13
samba samba 3.3.14
samba samba 3.3.15
samba samba 3.3.16
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4
samba samba 3.4.5
samba samba 3.4.6
samba samba 3.4.7
samba samba 3.4.8
samba samba 3.4.9
samba samba 3.4.10
samba samba 3.4.11
samba samba 3.4.12
samba samba 3.4.13
samba samba 3.4.14
samba samba 3.5.0
samba samba 3.5.1
samba samba 3.5.2
samba samba 3.5.3
samba samba 3.5.4
samba samba 3.5.5
samba samba 3.5.6
samba samba 3.5.7
samba samba 3.5.8
samba samba 3.5.9



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1165D501-3B60-4E0F-BBBF-7B54E089B6F4",
              "versionEndIncluding": "3.5.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B50D9E-EA43-44BF-9176-610EC808B986",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p1:*:*:*:*:*:*",
              "matchCriteriaId": "BCBBF662-40C3-4280-BE79-9D7C36A6DF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p2:*:*:*:*:*:*",
              "matchCriteriaId": "59819155-91CF-4B79-BCB2-BE0EBAB4F31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p3:*:*:*:*:*:*",
              "matchCriteriaId": "BDD6A6AE-C636-4131-807B-59F7784B7AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8C6D63F5-B72C-445A-BC61-D52D6022481B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p5:*:*:*:*:*:*",
              "matchCriteriaId": "1ADD724A-1747-4678-A659-0A528B728C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF3C20A1-F21D-41FF-8B87-B50E1AE8219E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p1:*:*:*:*:*:*",
              "matchCriteriaId": "A3ABEA3A-8F88-4947-80A5-CF1459F5AC8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p10:*:*:*:*:*:*",
              "matchCriteriaId": "86F85E94-9F94-457A-A606-35DB558484A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p2:*:*:*:*:*:*",
              "matchCriteriaId": "1ED4704B-2422-43C9-A2E0-9851F56D4CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p3:*:*:*:*:*:*",
              "matchCriteriaId": "158D175A-E0D7-45EF-BDD2-D86F2E8F7766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p4:*:*:*:*:*:*",
              "matchCriteriaId": "7854FCEF-D1F8-4DEC-A6CB-C4470899F71C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p5:*:*:*:*:*:*",
              "matchCriteriaId": "36D8B675-C209-4D5A-8EA7-1B3515E930FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p6:*:*:*:*:*:*",
              "matchCriteriaId": "4BCECF31-4C73-4ABA-9F84-D5DBA1DB1F50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p7:*:*:*:*:*:*",
              "matchCriteriaId": "2C5A1382-D147-43E5-8DB7-93B7A3B9AA0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p8:*:*:*:*:*:*",
              "matchCriteriaId": "3A497A5D-96FC-490E-87EB-94C1BE7338A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "245628A9-A5DC-403F-A781-7A066E9ECC78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F681E4CC-B8D3-48A2-B93E-0363B22B059E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D03B96-8FF3-4FC6-BC38-288F3ADBA9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF2248C-5A71-49FC-88F4-2D1F376155FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FD10B2-ED2D-4F55-8F0E-77429C8A716E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F15704-2F2B-4536-A2A0-510B5CE91D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "93AF43FA-9947-4F26-96E8-1D77BF909AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.5:a:*:*:*:*:*:*",
              "matchCriteriaId": "934771A9-94D4-46F3-8AAC-406A4F0F35E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDD0125-4C47-404A-9DC0-2E923C66B4D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A46D8D-1535-400B-B1CD-AA2685F4164D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CB46ABA-F403-4715-915D-870BD221C8FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD51F01-B47A-47F5-8798-2EB53EB17297",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C127A2E6-F94F-41D5-82AA-60C0190186BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "61291A4C-28A3-433B-80D2-005976851882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "6D3DD83D-4A1A-47BD-A512-A41E0FADD8DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65AC9643-E1A5-4013-9607-17C6CC7CC63B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0:a:*:*:*:*:*:*",
              "matchCriteriaId": "36CE0B6D-D1E5-4439-9269-7A58D4E1D6DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "090E2541-2DBA-41CB-A792-9E703C797949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCACECDD-40F1-4A9B-8B8A-20565FEE3627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1:a:*:*:*:*:*:*",
              "matchCriteriaId": "8EAB4FCD-292F-4677-ADF7-0185DE47F32A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F65FF3-71F8-4278-A823-A6E0FF65D9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C71CB60-2689-4A4A-9509-E2F3135E6491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0129E404-3AE8-4F0E-89CB-7F2FA5B47011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3:a:*:*:*:*:*:*",
              "matchCriteriaId": "3D33053A-6688-4BBD-B0E6-6658D328727C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "614547F5-9C3F-489B-9B72-91B0FF646CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A052141C-874D-4ED0-99FB-D7468FACFC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9739EA65-9FA8-425E-B355-E690773D5B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B618F94-DAC2-4A97-9F7F-8BCEA3199769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE7C057-B024-4417-B572-5D396366620E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7:a:*:*:*:*:*:*",
              "matchCriteriaId": "EC909A28-E679-48C6-8C04-3163B98F30E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DC3500-F8F0-46E1-B0AA-C2474CCB3DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFCD334C-FB95-41A6-8F4C-FCC4E70CE930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8:a:*:*:*:*:*:*",
              "matchCriteriaId": "A3CE81C3-BCAA-4614-847A-C865F5DDE936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "75C86202-3150-440C-B048-BB039E9D3606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CAF474-0C3A-4E49-8CF8-9DF14D84CDCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3ABF97-93A2-48C3-898E-9DADD5614BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92304DE-CFBB-4C03-AA7F-54DB3C14ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "04F39AA5-9048-4EE9-B0F2-CE679C673F0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC2AE5A9-62C5-4DCE-85B3-16F48695B3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.18.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "77268959-F841-47F1-A7B9-83861B8C9F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "A8CE218B-E64D-41DC-8CFD-9387427B72CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
              "matchCriteriaId": "9C2CDC66-8A44-4BEE-9574-FC69C38295A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
              "matchCriteriaId": "9AD55F6B-F753-41FC-8701-78A7DA556E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
              "matchCriteriaId": "0B63F362-A49C-401F-BE49-C6E1DC03E4F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
              "matchCriteriaId": "81F23C27-76CF-4906-B829-3B4F2E07900E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
              "matchCriteriaId": "EF6C8992-5210-483E-9EED-B7FC1EACA703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
              "matchCriteriaId": "EAF9C0EA-173A-4B02-9933-09DFAC31398D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "D87FDC2E-C6D9-4D10-BED6-B10C40232DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
              "matchCriteriaId": "A90CE26E-8993-49BA-91BF-536DBC44CAD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
              "matchCriteriaId": "33A9C2ED-355B-4903-ABC3-23C85B494053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
              "matchCriteriaId": "375BCF42-1A8A-4ACB-8198-FEA471A81B76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
              "matchCriteriaId": "C1C6E9D6-2964-4D63-9FCB-B4A02CC21975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
              "matchCriteriaId": "F8C1CA41-DBEF-46D7-9A94-930315BECACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
              "matchCriteriaId": "F6804F20-3B33-4FAA-ACC3-9658FF0770D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
              "matchCriteriaId": "0FFB13DF-53C5-4DF4-8D47-B40BD532E1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
              "matchCriteriaId": "49684CD5-4256-47CA-84BC-E319D8973314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
              "matchCriteriaId": "574ADE47-94CB-42A2-AE8E-A14FBB0EAFB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC56F11D-20DE-4399-AED1-DF42C7E62F97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "254D9460-899D-4D06-AC47-1914A42FC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "427DA06C-9F5C-4E9A-A39F-22CD5E4F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60CED3E-B7A6-4674-ADD5-A3B047C7D125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "07906A18-FD60-42A5-AC17-21F677EA1762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "A99F7DCF-CBD0-4BC1-9C07-F1CB807614BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFC3F99-11F6-496E-BF55-53CF1E012FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C93E46D-FDEA-4B59-8C84-8A3DCC6AB3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4633D2E-2CBE-4B92-AD35-ED57C5399ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F200FC8-DA2E-4D39-8FF7-423759307DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B7341D-B02F-405B-81A0-5F74CFA8F8E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207B352-D8F8-4E15-9507-D3AD10D56211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBA51B-159F-42E9-8A2C-2B9BF1EB7D98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8F01226-D9E6-460C-975A-618932D5F16F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD98764-741C-4FED-BE4D-446E8E8D31F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8C2E40-DA05-4B50-AB29-398AF71EBECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E81ED-032F-42B7-9D50-15CADE337AD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDD90A4-B50B-4640-ADDE-B75BBC34507C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFC3804-991A-4BAF-818E-E321DB21FB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE1B4D9-507A-43B2-81F3-77E411ABEF7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "857FCD47-F720-4273-BF1D-D5DC95ECA6D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8FE4AC-6E71-44CF-902D-BACA830C4CA2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs in Samba 3.5.10 and earlier does not properly verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0547."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n check_mtab en client/mount.cifs.c en mount.cifs en smbfs en Samba v3.5.10 y anteriores no verifica correctamente que el (1) nombre del dispositivo y (2) las cadenas de punto de montaje se componen de caracteres v\u00e1lidos, lo que permite causar a los usuarios locales una denegaci\u00f3n de servicio (corrupci\u00f3n de mtab) a trav\u00e9s de una cadena de texto hecha a mano. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incorrecta para el CVE-2.010-0547."
    }
  ],
  "id": "CVE-2011-2724",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 1.2,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 1.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-09-06T16:55:10.757",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://comments.gmane.org/gmane.linux.kernel.cifs/3827"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://git.samba.org/?p=cifs-utils.git%3Ba=commit%3Bh=1e7a32924b22d1f786b6f490ce8590656f578f91"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/07/29/9"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45798"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:148"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1220.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1221.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1025984"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://comments.gmane.org/gmane.linux.kernel.cifs/3827"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.samba.org/?p=cifs-utils.git%3Ba=commit%3Bh=1e7a32924b22d1f786b6f490ce8590656f578f91"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://openwall.com/lists/oss-security/2011/07/29/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45798"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:148"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1220.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1221.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025984"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=726691"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-10-31 20:29
Modified
2024-11-21 02:47
Summary
It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users.
References
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2017-0494.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2017-0495.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2017-0662.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2017-0744.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/94988Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1037494Third Party Advisory, VDB Entry
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2017:1265Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2125Issue Tracking, Mitigation, Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2016-2125.htmlMitigation, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0494.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0495.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0662.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0744.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/94988Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1037494Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1265Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2125Issue Tracking, Mitigation, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2016-2125.htmlMitigation, Patch, Vendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A8F34E8-7040-4DB7-9979-DD2D20C8D03C",
              "versionEndExcluding": "4.3.13",
              "versionStartIncluding": "3.0.25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A963A86-CAF4-4882-B9DC-E9C7CDA2764C",
              "versionEndExcluding": "4.4.8",
              "versionStartIncluding": "4.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6044E13A-532E-403E-AA23-4A77771D2094",
              "versionEndExcluding": "4.5.3",
              "versionStartIncluding": "4.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1986832-44C9-491E-A75D-AAD8FAE683E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "It was found that Samba before versions 4.5.3, 4.4.8, 4.3.13 always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users."
    },
    {
      "lang": "es",
      "value": "Se ha descubierto que Samba, en versiones anteriores a la 4.5.3, 4.4.8 y 4.3.13, siempre solicitaba tickets que pod\u00edan reenviarse al emplear la autenticaci\u00f3n de Kerberos. Un servicio al que Samba se ha autenticado con Kerberos podr\u00eda emplear el ticket para suplantar Samba con otros usuarios de servicios o dominios."
    }
  ],
  "id": "CVE-2016-2125",
  "lastModified": "2024-11-21T02:47:52.913",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.2,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-10-31T20:29:00.247",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94988"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1037494"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1265"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2125"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2125.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0494.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0495.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0662.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0744.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94988"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1037494"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1265"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2125"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2125.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-12-19 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Samba Web Administration Tool (SWAT) in Samba 2.0.7 installs the cgi.log logging file with world readable permissions, which allows local users to read sensitive information such as user names and passwords.
Impacted products
Vendor Product Version
samba samba 2.0.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CB46ABA-F403-4715-915D-870BD221C8FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 installs the cgi.log logging file with world readable permissions, which allows local users to read sensitive information such as user names and passwords."
    }
  ],
  "id": "CVE-2000-0936",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-12-19T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1874"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5445"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1874"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5445"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-04-25 00:59
Modified
2025-04-12 10:46
Summary
The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "client ldap sasl wrapping" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade attacks by modifying the client-server data stream.
References
secalert@redhat.comhttp://badlock.org/
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0611.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0612.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0613.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0614.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0618.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0619.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0620.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0624.html
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3548
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
secalert@redhat.comhttp://www.securitytracker.com/id/1035533
secalert@redhat.comhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-1
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-2
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-3
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-4
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-5
secalert@redhat.comhttps://bto.bluecoat.com/security-advisory/sa122
secalert@redhat.comhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
secalert@redhat.comhttps://security.gentoo.org/glsa/201612-47
secalert@redhat.comhttps://www.samba.org/samba/history/samba-4.2.10.html
secalert@redhat.comhttps://www.samba.org/samba/latest_news.html#4.4.2
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2016-2112.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://badlock.org/
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0611.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0612.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0613.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0614.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0618.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0619.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0620.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0624.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3548
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035533
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-2
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-3
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-4
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-5
af854a3a-2127-422b-91ae-364da2661108https://bto.bluecoat.com/security-advisory/sa122
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201612-47
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/history/samba-4.2.10.html
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/latest_news.html#4.4.2
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2016-2112.htmlPatch, Vendor Advisory
Impacted products
Vendor Product Version
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27
samba samba 3.0.27
samba samba 3.0.28
samba samba 3.0.28
samba samba 3.0.29
samba samba 3.0.30
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.0.34
samba samba 3.0.35
samba samba 3.0.36
samba samba 3.0.37
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12
samba samba 3.2.13
samba samba 3.2.14
samba samba 3.2.15
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.3.8
samba samba 3.3.9
samba samba 3.3.10
samba samba 3.3.11
samba samba 3.3.12
samba samba 3.3.13
samba samba 3.3.14
samba samba 3.3.15
samba samba 3.3.16
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4
samba samba 3.4.5
samba samba 3.4.6
samba samba 3.4.7
samba samba 3.4.8
samba samba 3.4.9
samba samba 3.4.10
samba samba 3.4.11
samba samba 3.4.12
samba samba 3.4.13
samba samba 3.4.14
samba samba 3.4.15
samba samba 3.4.16
samba samba 3.4.17
samba samba 3.5.0
samba samba 3.5.1
samba samba 3.5.2
samba samba 3.5.3
samba samba 3.5.4
samba samba 3.5.5
samba samba 3.5.6
samba samba 3.5.7
samba samba 3.5.8
samba samba 3.5.9
samba samba 3.5.10
samba samba 3.5.11
samba samba 3.5.12
samba samba 3.5.13
samba samba 3.5.14
samba samba 3.5.15
samba samba 3.5.16
samba samba 3.5.17
samba samba 3.5.18
samba samba 3.5.19
samba samba 3.5.20
samba samba 3.5.21
samba samba 3.5.22
samba samba 3.6.0
samba samba 3.6.1
samba samba 3.6.2
samba samba 3.6.3
samba samba 3.6.4
samba samba 3.6.5
samba samba 3.6.6
samba samba 3.6.7
samba samba 3.6.8
samba samba 3.6.9
samba samba 3.6.10
samba samba 3.6.11
samba samba 3.6.12
samba samba 3.6.13
samba samba 3.6.14
samba samba 3.6.15
samba samba 3.6.16
samba samba 3.6.17
samba samba 3.6.18
samba samba 3.6.19
samba samba 3.6.20
samba samba 3.6.21
samba samba 3.6.22
samba samba 3.6.23
samba samba 3.6.24
samba samba 3.6.25
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.0.11
samba samba 4.0.12
samba samba 4.0.13
samba samba 4.0.14
samba samba 4.0.15
samba samba 4.0.16
samba samba 4.0.17
samba samba 4.0.18
samba samba 4.0.19
samba samba 4.0.20
samba samba 4.0.21
samba samba 4.0.22
samba samba 4.0.23
samba samba 4.0.24
samba samba 4.0.25
samba samba 4.0.26
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.1.6
samba samba 4.1.7
samba samba 4.1.8
samba samba 4.1.9
samba samba 4.1.10
samba samba 4.1.11
samba samba 4.1.12
samba samba 4.1.13
samba samba 4.1.14
samba samba 4.1.15
samba samba 4.1.16
samba samba 4.1.17
samba samba 4.1.18
samba samba 4.1.19
samba samba 4.1.20
samba samba 4.1.21
samba samba 4.1.22
samba samba 4.1.23
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.1
samba samba 4.2.2
samba samba 4.2.3
samba samba 4.2.4
samba samba 4.2.5
samba samba 4.2.6
samba samba 4.2.7
samba samba 4.2.8
samba samba 4.2.9
samba samba 4.3.0
samba samba 4.3.1
samba samba 4.3.2
samba samba 4.3.3
samba samba 4.3.4
samba samba 4.3.5
samba samba 4.3.6
samba samba 4.4.0
canonical ubuntu_linux 14.04
canonical ubuntu_linux 15.10
canonical ubuntu_linux 16.04



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "A8CE218B-E64D-41DC-8CFD-9387427B72CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
              "matchCriteriaId": "9C2CDC66-8A44-4BEE-9574-FC69C38295A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
              "matchCriteriaId": "9AD55F6B-F753-41FC-8701-78A7DA556E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
              "matchCriteriaId": "0B63F362-A49C-401F-BE49-C6E1DC03E4F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
              "matchCriteriaId": "81F23C27-76CF-4906-B829-3B4F2E07900E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
              "matchCriteriaId": "EF6C8992-5210-483E-9EED-B7FC1EACA703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
              "matchCriteriaId": "EAF9C0EA-173A-4B02-9933-09DFAC31398D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "D87FDC2E-C6D9-4D10-BED6-B10C40232DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
              "matchCriteriaId": "A90CE26E-8993-49BA-91BF-536DBC44CAD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
              "matchCriteriaId": "33A9C2ED-355B-4903-ABC3-23C85B494053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
              "matchCriteriaId": "375BCF42-1A8A-4ACB-8198-FEA471A81B76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
              "matchCriteriaId": "C1C6E9D6-2964-4D63-9FCB-B4A02CC21975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
              "matchCriteriaId": "F8C1CA41-DBEF-46D7-9A94-930315BECACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
              "matchCriteriaId": "F6804F20-3B33-4FAA-ACC3-9658FF0770D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
              "matchCriteriaId": "0FFB13DF-53C5-4DF4-8D47-B40BD532E1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
              "matchCriteriaId": "49684CD5-4256-47CA-84BC-E319D8973314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
              "matchCriteriaId": "574ADE47-94CB-42A2-AE8E-A14FBB0EAFB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "254D9460-899D-4D06-AC47-1914A42FC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "427DA06C-9F5C-4E9A-A39F-22CD5E4F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60CED3E-B7A6-4674-ADD5-A3B047C7D125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "07906A18-FD60-42A5-AC17-21F677EA1762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "A99F7DCF-CBD0-4BC1-9C07-F1CB807614BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFC3F99-11F6-496E-BF55-53CF1E012FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C93E46D-FDEA-4B59-8C84-8A3DCC6AB3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4633D2E-2CBE-4B92-AD35-ED57C5399ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F200FC8-DA2E-4D39-8FF7-423759307DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B7341D-B02F-405B-81A0-5F74CFA8F8E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207B352-D8F8-4E15-9507-D3AD10D56211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBA51B-159F-42E9-8A2C-2B9BF1EB7D98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8F01226-D9E6-460C-975A-618932D5F16F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD98764-741C-4FED-BE4D-446E8E8D31F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4048DF8D-628D-4786-A883-0A1865DEBB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E7A4E4-940B-43C4-98A2-70F443A59120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82A06CD-338D-4095-BC7D-2E38050D388A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8C2E40-DA05-4B50-AB29-398AF71EBECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E81ED-032F-42B7-9D50-15CADE337AD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDD90A4-B50B-4640-ADDE-B75BBC34507C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFC3804-991A-4BAF-818E-E321DB21FB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE1B4D9-507A-43B2-81F3-77E411ABEF7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "857FCD47-F720-4273-BF1D-D5DC95ECA6D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8FE4AC-6E71-44CF-902D-BACA830C4CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EE762A-F95F-42CF-BB80-B0EF81A438EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "738095D8-8ACE-4CF4-9D97-4228FC686F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4634FC-DA4E-4B1D-B1AB-A45D8235780D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA83A66-BD39-4560-8EAF-ADF2433EF36D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B1F854-FC98-4DE9-8514-FD52301C5038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "388B4551-AF4C-46D6-840E-D489B05675C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F9D2E0-C795-4A5A-9398-4630B78FCB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D176AD-EA34-4DA2-9926-079438030E74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CF8CA5-0821-49CF-8B8C-2D2D5F63A061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A89C5FB-AA8B-41DC-93D5-81E199D73061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E71E10D0-E7C2-4D14-B685-4FB154B0A865",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "05993D31-BC6D-44CD-808C-4A40F998BF0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "5560111D-8930-4B70-BD51-25343FBEED1C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "406C2297-B58D-4623-9E7A-2C438ABBAC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6AF0DD4-08D4-4726-8A12-E979FF3322B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F98DE75F-84AD-42EE-B9DA-8AFF22D2BF3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3DAE05B-9086-4702-9586-77B34399E1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA544013-8FAC-4452-9D38-081C514E2981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DE15C9-3308-4DE0-8048-9B06AF4D7343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CB4968-F331-4653-8B9F-75BA4BB7A6D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3470D075-CCF2-42A1-A8C9-E375FC05FF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA72F88-6799-4E6C-B73C-C92616B04661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF17CB71-6E46-4A1E-9EAB-7D2E182D56C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E7FA486-73CE-4226-86C6-DA8383C5578F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17D2B72-19E2-4DE6-B1E3-F1823E2690BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAC6922A-03CD-484A-BF40-F8F937428062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "8470C251-2874-4047-A759-F8D5C6D5C755",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "332308A1-4BA4-4BC7-8B4B-7463CF98B664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE7DEA84-27E5-4CF0-AC2A-B128BB5AE199",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "455B73D1-E8F1-478C-8CEB-79E4B5F33A78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AC49023-CAD6-4875-BF94-EEC290E8A5A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "C42BFAF8-5822-4782-B60D-BCB131834419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1FD9EF-A863-48C6-8471-AB1D80B3C1E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4B8A690-81D0-40C4-9301-CF1992C2DA0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC65AE61-426D-4072-90A1-667AD31B73C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EAFEF2-0FE6-4EE8-B879-79FC24A7F27F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E0C61-7718-4DBC-8F02-6F3C2CBE1783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "324AE9D7-C41F-493E-A1AD-FCD869D29D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "68519B1F-F315-4BBD-A4A3-4E1956D81E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF745E93-A92E-4AD7-8D42-36E9387C6915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4B760-417E-45D1-9CE1-AEBC8936BDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0DA221-078A-49DC-B0F1-F318FD785664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72BCA7B-6338-4A7C-AE71-E0B8F6C9F2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8F6AB9-A6C4-443E-A846-EE845BE24F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C8F7D7-BAAD-4F3A-BA39-44BE0CCADFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC522377-A6CD-4513-83B4-9ADC15F76B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC4595-5699-4237-BCD7-FD233BA1AECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EFCC9DB-4AA9-460E-87F0-1F74DEBB104B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FAC8F1-CB72-4DBD-9746-372246BEFEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44BD172-80FA-4260-BAFB-251A95E8C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09116D2-F168-4305-9A1D-88A1D42739A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "558E0B71-F79E-47B5-90CC-9C165BB15507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D7E102-DD54-43F2-B008-66F7C243477E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8066AB8C-1AE6-4DA3-91DB-4BF67DBBA279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A03CB9E-DEFC-4507-A314-5E0824A66462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6708D6E-2098-432D-820A-853032BD9A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "42BA346B-F7C6-4EB3-91BD-2CCC2B688AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B689AA-2074-4E9A-93BD-F910510A29AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF22E49-B259-4E13-B371-0C0173E534FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE5C0A8F-A502-4BC1-AC8A-45AE1D16371D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73876B7-A758-40CB-919D-6720AA7B9564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "84925F68-F440-4677-B3DF-F87EAC39E235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC0A0B3C-C011-4F27-BE8D-5A89BFC93F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7792A65-DB6E-49F4-9447-021EA9A82697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF3B982-B094-4B54-84A2-4CA199EE4E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6811F5-DDCA-4AED-9BF9-4C71550A727D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF1670DE-C3B6-4EA3-8132-66BBD4CEFAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AE10A1EF-F9CE-4126-9793-FB70A1D512A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7FA4DD6C-1531-420A-B271-EB16EA05470B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "AB6AEA9D-42C8-4C60-86AE-54DB2940A3B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2F221BF0-7B2B-4676-B8F2-2705C05B4034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C395C0-160C-4D8A-A3B6-7E30DD8721EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17EC5DF-2F00-479B-9775-45DA569BCED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CC31CBA-10A4-417C-A381-2BB7A68CE0D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D07800-4CCD-4B98-8D41-778295D1A3A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C4D3BA-781F-4C96-9234-73DB1593C7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AACDFB6-841E-42A5-AA8D-58E8A38D11D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD43D2C5-26D5-41AC-BC20-FACB68D22F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D186867E-18D6-4960-B8BE-A4353D941357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "23DAAAEB-EB1E-4BCD-B88E-33418E3FD1DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8643B45-1CE3-492F-BD82-65801F6C6FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F009D18-204C-4E6D-9827-9FBA9A4FFBA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "158DC9D2-2264-48B6-9116-CE6F0138D7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4339B46-E92A-4F7C-A0BA-62D7F7C428DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3D5E50-874B-48AE-B7C0-264DA0531847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "60C0F5A3-DB13-4BAC-B633-7E7F54FE34FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E28BFB7-FB1A-455E-BE0B-ADDEBFA9B9B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A0453F7-380D-4F29-9B54-D47AAAD9FFE6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The bundled LDAP client library in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the \"client ldap sasl wrapping\" setting, which allows man-in-the-middle attackers to perform LDAP protocol-downgrade attacks by modifying the client-server data stream."
    },
    {
      "lang": "es",
      "value": "El paquete de la librer\u00eda cliente LDAP en Samba 3.x y 4.x en versiones anteriores a 4.2.11, 4.3.x en versiones anteriores a 4.3.8 y 4.4.x en versiones anteriores a 4.4.2 no reconoce el ajuste \"client ldap sasl wrapping\", lo que permite a atacantes man-in-the-middle llevar a cabo ataques de degradaci\u00f3n de protocolo LDAP modificando el flujo de datos cliente-servidor."
    }
  ],
  "id": "CVE-2016-2112",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-25T00:59:03.097",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://badlock.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2016/dsa-3548"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1035533"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bto.bluecoat.com/security-advisory/sa122"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2112.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://badlock.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bto.bluecoat.com/security-advisory/sa122"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05087821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05082964"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2112.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-254"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-03-14 10:55
Modified
2025-04-12 10:46
Severity ?
Summary
The owner_set function in smbcacls.c in smbcacls in Samba 4.0.x before 4.0.16 and 4.1.x before 4.1.6 removes an ACL during use of a --chown or --chgrp option, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging an unintended administrative change.
Impacted products
Vendor Product Version
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.0.11
samba samba 4.0.12
samba samba 4.0.13
samba samba 4.0.14
samba samba 4.0.15



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E0C61-7718-4DBC-8F02-6F3C2CBE1783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "324AE9D7-C41F-493E-A1AD-FCD869D29D51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The owner_set function in smbcacls.c in smbcacls in Samba 4.0.x before 4.0.16 and 4.1.x before 4.1.6 removes an ACL during use of a --chown or --chgrp option, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging an unintended administrative change."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n owner_set en smbcacls.c en smbcacls en Samba 4.0.x anterior a 4.0.16 y 4.1.x anterior a 4.1.6 elimina una ACL durante el uso de una opci\u00f3n de --chown o --chgrp, lo que permite a atacantes remotos evadir restricciones de acceso en circunstancias oportunistas mediante el aprovechamiento de un cambio de administrativo no intencionado."
    }
  ],
  "id": "CVE-2013-6442",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-03-14T10:55:05.520",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.samba.org/samba/history/samba-4.0.16.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.samba.org/samba/history/samba-4.1.6.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.samba.org/samba/security/CVE-2013-6442"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/66232"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=10327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/history/samba-4.0.16.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/history/samba-4.1.6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/security/CVE-2013-6442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/66232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=10327"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-25 18:15
Modified
2024-11-21 07:06
Summary
A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer).
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C2499D3-277A-4B0F-AD27-4506D02829DE",
              "versionEndExcluding": "4.14.14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E54A3-23C1-497D-864D-EDF15D85FB81",
              "versionEndExcluding": "4.15.9",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8479455F-FFCD-46F1-B0E3-EBC082F89C16",
              "versionEndExcluding": "4.16.4",
              "versionStartIncluding": "4.16.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in Samba. Some SMB1 write requests were not correctly range-checked to ensure the client had sent enough data to fulfill the write, allowing server memory contents to be written into the file (or printer) instead of client-supplied data. The client cannot control the area of the server memory written to the file (or printer)."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo en Samba. Algunas solicitudes de escritura de SMB1 no son comprobaban correctamente para asegurar que el cliente hab\u00eda enviado suficientes datos para completar la escritura, lo que permit\u00eda que el contenido de la memoria del servidor fuera escrita en el archivo (o impresora) en lugar de los datos proporcionados por el cliente. El cliente no puede controlar el \u00e1rea de la memoria del servidor que es escrita en el archivo (o impresora)."
    }
  ],
  "id": "CVE-2022-32742",
  "lastModified": "2024-11-21T07:06:52.260",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-08-25T18:15:10.430",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-32742.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-32742.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-07-27 12:29
Modified
2024-11-21 03:08
Summary
A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack.
References
secalert@redhat.comhttp://www.securityfocus.com/bid/100917Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1039401Third Party Advisory, VDB Entry
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2017:2790Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2017:2858Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20170921-0001/Third Party Advisory
secalert@redhat.comhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_usThird Party Advisory
secalert@redhat.comhttps://www.debian.org/security/2017/dsa-3983Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2017-12151.htmlMitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/100917Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1039401Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:2790Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:2858Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20170921-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2017/dsa-3983Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2017-12151.htmlMitigation, Vendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FF52F5F-8DF4-48FC-A4F1-F41C17DEEC0D",
              "versionEndExcluding": "4.4.16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CE62DA6-5CD9-4805-BBE3-65F342B13AC8",
              "versionEndExcluding": "4.5.14",
              "versionStartIncluding": "4.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EF4B09A-5F81-4A13-B7FA-F4A97C773405",
              "versionEndExcluding": "4.6.8",
              "versionStartIncluding": "4.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:cifs_server:b.04.05.11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "68013CEA-3847-44BE-8019-93F7B06B50FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in the way samba client before samba 4.4.16, samba 4.5.14 and samba 4.6.8 used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo en la forma en la que el cliente samba en versiones anteriores a samba 4.4.16, samba 4.5.14 y samba 4.6.8 utilizaba cifrado con el protocolo max establecido en SMB3. La conexi\u00f3n pod\u00eda perder el requisito de firmar y cifrar con cualquier redirecci\u00f3n DFS, lo que permit\u00eda a un atacante leer o alterar el contenido de la conexi\u00f3n mediante un ataque Man-in-the-Middle (MitM)."
    }
  ],
  "id": "CVE-2017-12151",
  "lastModified": "2024-11-21T03:08:56.363",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.2,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-07-27T12:29:00.223",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/100917"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1039401"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2790"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2858"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20170921-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2017/dsa-3983"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2017-12151.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/100917"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1039401"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2790"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2858"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20170921-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2017/dsa-3983"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2017-12151.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-300"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-25 18:17
Modified
2024-11-21 08:42
Summary
A heap-based Buffer Overflow flaw was discovered in Samba. It could allow a remote, authenticated attacker to exploit this vulnerability to cause a denial of service.
Impacted products
Vendor Product Version
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFC1624A-4B44-4762-A4D3-56EBB0A7E40E",
              "versionEndExcluding": "4.19.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A heap-based Buffer Overflow flaw was discovered in Samba. It could allow a remote, authenticated attacker to exploit this vulnerability to cause a denial of service."
    },
    {
      "lang": "es",
      "value": "Se descubri\u00f3 una falla de desbordamiento de b\u00fafer basada en mont\u00f3n en Samba. Podr\u00eda permitir que un atacante remoto y autenticado aproveche esta vulnerabilidad para provocar una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2023-5568",
  "lastModified": "2024-11-21T08:42:02.083",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 4.2,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-25T18:17:43.710",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-5568"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245174"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=15491"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.samba.org/samba/history/samba-4.19.2.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-5568"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245174"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=15491"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20231124-0007/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://www.samba.org/samba/history/samba-4.19.2.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-122"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-10-07 18:30
Modified
2025-04-09 00:30
Severity ?
Summary
mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://news.samba.org/releases/3.0.37/Broken Link, Vendor Advisory
cve@mitre.orghttp://news.samba.org/releases/3.2.15/Broken Link, Vendor Advisory
cve@mitre.orghttp://news.samba.org/releases/3.3.8/Broken Link, Vendor Advisory
cve@mitre.orghttp://news.samba.org/releases/3.4.2/Broken Link, Vendor Advisory
cve@mitre.orghttp://osvdb.org/58520Broken Link
cve@mitre.orghttp://secunia.com/advisories/36893Not Applicable, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36918Not Applicable, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36937Not Applicable, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36953Not Applicable, Vendor Advisory
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439Patch, Third Party Advisory
cve@mitre.orghttp://www.samba.org/samba/security/CVE-2009-2948.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/36572Patch, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id?1022975Broken Link, Patch, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/USN-839-1Third Party Advisory
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/2810Permissions Required, Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/53574Third Party Advisory, VDB Entry
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10434Broken Link, Third Party Advisory
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7087Broken Link, Third Party Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.htmlPatch, Third Party Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.0.37/Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.2.15/Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.3.8/Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.4.2/Broken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/58520Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36893Not Applicable, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36918Not Applicable, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36937Not Applicable, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36953Not Applicable, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2009-2948.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/36572Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022975Broken Link, Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-839-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2810Permissions Required, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/53574Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10434Broken Link, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7087Broken Link, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.htmlPatch, Third Party Advisory
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0E114F0-973F-47CA-A233-53AC718A97F1",
              "versionEndExcluding": "3.0.37",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "836C7AC0-CAE0-459A-A8A5-AA60DFD693CE",
              "versionEndExcluding": "3.2.15",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C888EF-28BF-44BF-9E47-564B0C3222F4",
              "versionEndExcluding": "3.3.8",
              "versionStartIncluding": "3.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3209E99-C442-4B0E-8EDB-E4EB995AC9C6",
              "versionEndExcluding": "3.4.2",
              "versionStartIncluding": "3.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option."
    },
    {
      "lang": "es",
      "value": "mount.cifs en Samba v3.0 anterior a v3.0.37, v3.2  anterior a v3.2.15, v3.3  anterior a v3.3.8 y v3.4 anterior a v3.4.2, cuando mount.cifs es instalado con el suid root, no refuerza los permisos adecuadamente, lo que permite a usuarios locales leer parte del archivo de credenciales y obtener la contrase\u00f1a especificando la ruta al archivo de credenciales y usando la opci\u00f3n --verbose o -v."
    }
  ],
  "id": "CVE-2009-2948",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.9,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-10-07T18:30:00.920",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.0.37/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.2.15/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.3.8/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.4.2/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/58520"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36893"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36918"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36937"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36953"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2009-2948.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/36572"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1022975"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-839-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2810"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53574"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10434"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7087"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.0.37/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.2.15/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.3.8/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.4.2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/58520"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36893"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Not Applicable",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36953"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2009-2948.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/36572"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1022975"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-839-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2810"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53574"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7087"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-28 14:29
Modified
2024-11-21 03:53
Summary
Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation's password policies apply as expected may not have been re-done after the upgrade.
Impacted products
Vendor Product Version
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6711DD48-1D71-4F14-A071-8A3F08D84162",
              "versionEndExcluding": "4.9.3",
              "versionStartIncluding": "4.9.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba from version 4.9.0 and before version 4.9.3 that have AD DC configurations watching for bad passwords (to restrict brute forcing of passwords) in a window of more than 3 minutes may not watch for bad passwords at all. The primary risk from this issue is with regards to domains that have been upgraded from Samba 4.8 and earlier. In these cases the manual testing done to confirm an organisation\u0027s password policies apply as expected may not have been re-done after the upgrade."
    },
    {
      "lang": "es",
      "value": "Samba, desde la versi\u00f3n 4.9.0 y antes de la versi\u00f3n 4.9.3, con las configuraciones AD DC buscando malas contrase\u00f1as (para restringir la adivinaci\u00f3n de contrase\u00f1as por fuerza bruta) durante m\u00e1s de 3 minutos podr\u00eda no buscar malas contrase\u00f1as en absoluto. El riesgo principal de este problema est\u00e1 relacionado con los dominios que se han actualizado desde Samba 4.8 y anteriores. En estos casos, las pruebas manuales realizadas para confirmar que las pol\u00edticas de contrase\u00f1a de una organizaci\u00f3n se aplican como deber\u00edan podr\u00edan no volver a realizarse tras la actualizaci\u00f3n."
    }
  ],
  "id": "CVE-2018-16857",
  "lastModified": "2024-11-21T03:53:27.577",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.2,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-28T14:29:00.610",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106024"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20181127-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-16857.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16857"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20181127-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-16857.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-358"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-358"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-11-13 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS).
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-11/msg00083.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-11/msg00115.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-11/msg00117.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-12/msg00088.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1806.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0009.htmlThird Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/56508Third Party Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201502-15.xmlThird Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2812Third Party Advisory
secalert@redhat.comhttp://www.samba.org/samba/history/samba-3.6.20.htmlVendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/history/samba-4.0.11.htmlVendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/history/samba-4.1.1.htmlVendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2013-4475Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/63646Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2054-1Third Party Advisory
secalert@redhat.comhttps://blogs.oracle.com/sunsecurity/entry/cve_2013_4475_access_controlThird Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-11/msg00115.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-11/msg00117.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1806.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0009.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56508Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201502-15.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2812Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/history/samba-3.6.20.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/history/samba-4.0.11.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/history/samba-4.1.1.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2013-4475Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/63646Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2054-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://blogs.oracle.com/sunsecurity/entry/cve_2013_4475_access_controlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77468FAD-B728-4EAE-964E-14E5858F3011",
              "versionEndExcluding": "3.6.20",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C366F9F-70AF-4292-9946-C5FCF8755A6A",
              "versionEndExcluding": "4.0.11",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFAA48D9-BEB4-4E49-AD50-325C262D46D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F61F047-129C-41A6-8A27-FFCBB8563E91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 3.2.x through 3.6.x before 3.6.20, 4.0.x before 4.0.11, and 4.1.x before 4.1.1, when vfs_streams_depot or vfs_streams_xattr is enabled, allows remote attackers to bypass intended file restrictions by leveraging ACL differences between a file and an associated alternate data stream (ADS)."
    },
    {
      "lang": "es",
      "value": "Samba 3.x anteriores a 3.6.20, 4.0.x anteriores a 4.0.11, y 4.1.x anteriores a 4.1.1, cuando vfs_streams_depot o vfs_streams_xattr est\u00e1 activo, permite a atacantes remotos sortear restricciones de fichero aprovechando diferencias en las ACL entre un fichero un \"alternate data stream\" (ADS) asociado."
    }
  ],
  "id": "CVE-2013-4475",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-13T15:55:03.470",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00115.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00117.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/56508"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2013/dsa-2812"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-3.6.20.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-4.0.11.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-4.1.1.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-4475"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/63646"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2054-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_4475_access_control"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2014-01/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00115.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00117.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1806.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/56508"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2013/dsa-2812"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-3.6.20.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-4.0.11.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-4.1.1.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-4475"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/63646"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2054-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blogs.oracle.com/sunsecurity/entry/cve_2013_4475_access_control"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-03-15 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "245628A9-A5DC-403F-A781-7A066E9ECC78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142BCD48-8387-4D0C-A052-44DD4144CBFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
              "matchCriteriaId": "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
              "matchCriteriaId": "2255842B-34CD-4062-886C-37161A065703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
              "matchCriteriaId": "F0ED322D-004C-472E-A37F-89B78C55FE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
              "matchCriteriaId": "412F7334-C46B-4F61-B38A-2CA56B498151",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
              "matchCriteriaId": "5967AF83-798D-4B1E-882A-5737FFC859C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
              "matchCriteriaId": "A90D2123-D55B-4104-8D82-5B6365AA3B77",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
              "matchCriteriaId": "DCCDFD49-D402-420E-92F5-20445A0FE139",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
              "matchCriteriaId": "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
              "matchCriteriaId": "8877D178-1655-46E9-8F5A-2DD576601F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
              "matchCriteriaId": "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
              "matchCriteriaId": "8358E965-3689-4B05-8470-C4A1463FA0E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2C14A949-E2B8-4100-8ED4-645CB996B08A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
              "matchCriteriaId": "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted."
    },
    {
      "lang": "es",
      "value": "smbmnt en Samba 2.0 y 3.0 para Linux 2.6, cuando se instala con setuid, permite a usuarios locales ganar privilegios de root montando un recurso compartido de Samba que contiene un programa con setuid de root, cuyos atributos no se limpian cuando el recurso compartido es eliminado."
    }
  ],
  "id": "CVE-2004-0186",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-03-15T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=107636290906296\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=107657505718743\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-463"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/3916"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9619"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15131"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=107636290906296\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=107657505718743\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2004/dsa-463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/3916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15131"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-02-02 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html
secalert@redhat.comhttp://osvdb.org/89627
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1310.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2013-1542.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0305.html
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2617
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2013-0214Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/57631
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2922-1
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/89627
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1310.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2013-1542.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0305.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2617
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2013-0214Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/57631
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2922-1
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993
Impacted products
Vendor Product Version
samba samba 3.6.0
samba samba 3.6.1
samba samba 3.6.2
samba samba 3.6.3
samba samba 3.6.4
samba samba 3.6.5
samba samba 3.6.6
samba samba 3.6.7
samba samba 3.6.8
samba samba 3.6.9
samba samba 3.6.10
samba samba 3.6.11
samba samba 4.0.0
samba samba 4.0.1
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27
samba samba 3.0.27
samba samba 3.0.28
samba samba 3.0.28
samba samba 3.0.29
samba samba 3.0.30
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.0.34
samba samba 3.0.35
samba samba 3.0.36
samba samba 3.0.37
samba samba 3.1.0
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12
samba samba 3.2.13
samba samba 3.2.14
samba samba 3.2.15
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.3.8
samba samba 3.3.9
samba samba 3.3.10
samba samba 3.3.11
samba samba 3.3.12
samba samba 3.3.13
samba samba 3.3.14
samba samba 3.3.15
samba samba 3.3.16
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4
samba samba 3.4.5
samba samba 3.4.6
samba samba 3.4.7
samba samba 3.4.8
samba samba 3.4.9
samba samba 3.4.10
samba samba 3.4.11
samba samba 3.4.12
samba samba 3.4.13
samba samba 3.4.14
samba samba 3.4.15
samba samba 3.4.16
samba samba 3.4.17
samba samba 3.5.0
samba samba 3.5.1
samba samba 3.5.2
samba samba 3.5.3
samba samba 3.5.4
samba samba 3.5.5
samba samba 3.5.6
samba samba 3.5.7
samba samba 3.5.8
samba samba 3.5.9
samba samba 3.5.10
samba samba 3.5.11
samba samba 3.5.12
samba samba 3.5.13
samba samba 3.5.14
samba samba 3.5.15
samba samba 3.5.16
samba samba 3.5.17
samba samba 3.5.18
samba samba 3.5.19
samba samba 3.5.20



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "406C2297-B58D-4623-9E7A-2C438ABBAC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6AF0DD4-08D4-4726-8A12-E979FF3322B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F98DE75F-84AD-42EE-B9DA-8AFF22D2BF3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3DAE05B-9086-4702-9586-77B34399E1EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA544013-8FAC-4452-9D38-081C514E2981",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "21DE15C9-3308-4DE0-8048-9B06AF4D7343",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62CB4968-F331-4653-8B9F-75BA4BB7A6D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3470D075-CCF2-42A1-A8C9-E375FC05FF47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA72F88-6799-4E6C-B73C-C92616B04661",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:a:*:*:*:*:*:*",
              "matchCriteriaId": "A8CE218B-E64D-41DC-8CFD-9387427B72CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:a:*:*:*:*:*:*",
              "matchCriteriaId": "9C2CDC66-8A44-4BEE-9574-FC69C38295A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:a:*:*:*:*:*:*",
              "matchCriteriaId": "9AD55F6B-F753-41FC-8701-78A7DA556E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:b:*:*:*:*:*:*",
              "matchCriteriaId": "0B63F362-A49C-401F-BE49-C6E1DC03E4F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:a:*:*:*:*:*:*",
              "matchCriteriaId": "81F23C27-76CF-4906-B829-3B4F2E07900E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:b:*:*:*:*:*:*",
              "matchCriteriaId": "EF6C8992-5210-483E-9EED-B7FC1EACA703",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:c:*:*:*:*:*:*",
              "matchCriteriaId": "EAF9C0EA-173A-4B02-9933-09DFAC31398D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:a:*:*:*:*:*:*",
              "matchCriteriaId": "D87FDC2E-C6D9-4D10-BED6-B10C40232DC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:b:*:*:*:*:*:*",
              "matchCriteriaId": "A90CE26E-8993-49BA-91BF-536DBC44CAD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:c:*:*:*:*:*:*",
              "matchCriteriaId": "33A9C2ED-355B-4903-ABC3-23C85B494053",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:d:*:*:*:*:*:*",
              "matchCriteriaId": "375BCF42-1A8A-4ACB-8198-FEA471A81B76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:a:*:*:*:*:*:*",
              "matchCriteriaId": "C1C6E9D6-2964-4D63-9FCB-B4A02CC21975",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:b:*:*:*:*:*:*",
              "matchCriteriaId": "F8C1CA41-DBEF-46D7-9A94-930315BECACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:c:*:*:*:*:*:*",
              "matchCriteriaId": "F6804F20-3B33-4FAA-ACC3-9658FF0770D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:a:*:*:*:*:*:*",
              "matchCriteriaId": "0FFB13DF-53C5-4DF4-8D47-B40BD532E1C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:a:*:*:*:*:*:*",
              "matchCriteriaId": "49684CD5-4256-47CA-84BC-E319D8973314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:a:*:*:*:*:*:*",
              "matchCriteriaId": "574ADE47-94CB-42A2-AE8E-A14FBB0EAFB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC56F11D-20DE-4399-AED1-DF42C7E62F97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "254D9460-899D-4D06-AC47-1914A42FC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "427DA06C-9F5C-4E9A-A39F-22CD5E4F53D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60CED3E-B7A6-4674-ADD5-A3B047C7D125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "07906A18-FD60-42A5-AC17-21F677EA1762",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "A99F7DCF-CBD0-4BC1-9C07-F1CB807614BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFC3F99-11F6-496E-BF55-53CF1E012FAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C93E46D-FDEA-4B59-8C84-8A3DCC6AB3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4633D2E-2CBE-4B92-AD35-ED57C5399ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F200FC8-DA2E-4D39-8FF7-423759307DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B7341D-B02F-405B-81A0-5F74CFA8F8E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207B352-D8F8-4E15-9507-D3AD10D56211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBA51B-159F-42E9-8A2C-2B9BF1EB7D98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8F01226-D9E6-460C-975A-618932D5F16F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD98764-741C-4FED-BE4D-446E8E8D31F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4048DF8D-628D-4786-A883-0A1865DEBB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E7A4E4-940B-43C4-98A2-70F443A59120",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B82A06CD-338D-4095-BC7D-2E38050D388A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8C2E40-DA05-4B50-AB29-398AF71EBECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E81ED-032F-42B7-9D50-15CADE337AD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDD90A4-B50B-4640-ADDE-B75BBC34507C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFC3804-991A-4BAF-818E-E321DB21FB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE1B4D9-507A-43B2-81F3-77E411ABEF7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "857FCD47-F720-4273-BF1D-D5DC95ECA6D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8FE4AC-6E71-44CF-902D-BACA830C4CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EE762A-F95F-42CF-BB80-B0EF81A438EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "738095D8-8ACE-4CF4-9D97-4228FC686F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4634FC-DA4E-4B1D-B1AB-A45D8235780D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA83A66-BD39-4560-8EAF-ADF2433EF36D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B1F854-FC98-4DE9-8514-FD52301C5038",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "388B4551-AF4C-46D6-840E-D489B05675C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F9D2E0-C795-4A5A-9398-4630B78FCB26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D176AD-EA34-4DA2-9926-079438030E74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CF8CA5-0821-49CF-8B8C-2D2D5F63A061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A89C5FB-AA8B-41DC-93D5-81E199D73061",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E71E10D0-E7C2-4D14-B685-4FB154B0A865",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en el Samba Web Administration Tool (SWAT)en Samba v3.x anterior a v3.5.21, v3.6.x anterior a v3.6.12, y v4.x anterior a v4.0.2, permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios de su elecci\u00f3n para aprovecharse de la contrase\u00f1a y hacer peticiones que lleven a cabo acciones SWAT"
    }
  ],
  "id": "CVE-2013-0214",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-02-02T20:55:03.147",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/89627"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2013/dsa-2617"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-0214"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/57631"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2922-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00029.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-02/msg00033.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/89627"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1310.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1542.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0305.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2617"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-0214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/57631"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2922-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-08-22 14:29
Modified
2024-11-21 03:59
Summary
A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable
Impacted products
Vendor Product Version
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E405D2-03BC-4808-A8F1-1C4BF24CFCCA",
              "versionEndExcluding": "4.8.4",
              "versionStartIncluding": "4.8.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable"
    },
    {
      "lang": "es",
      "value": "Se ha detectado la ausencia de medidas de saneamiento de entradas en la implementaci\u00f3n de la base de datos LDP utilizada para el servidor LDAP. Un atacante podr\u00eda usar este fallo para causar una denegaci\u00f3n de servicio (DoS) contra un servidor samba, usado como un controlador de dominio de directorio activo. Todas las versiones de Samba a partir de la 4.8.0 son vulnerables."
    }
  ],
  "id": "CVE-2018-1140",
  "lastModified": "2024-11-21T03:59:16.320",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-08-22T14:29:00.490",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105082"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=13374"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180814-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-1140.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=13374"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180814-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-1140.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-02-06 02:28
Modified
2025-04-09 00:30
Severity ?
Summary
smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop.
References
secalert@redhat.comftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
secalert@redhat.comhttp://fedoranews.org/cms/node/2579
secalert@redhat.comhttp://fedoranews.org/cms/node/2580
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462
secalert@redhat.comhttp://lists.suse.com/archive/suse-security-announce/2007-Feb/0002.html
secalert@redhat.comhttp://osvdb.org/33100
secalert@redhat.comhttp://secunia.com/advisories/24021
secalert@redhat.comhttp://secunia.com/advisories/24030
secalert@redhat.comhttp://secunia.com/advisories/24046
secalert@redhat.comhttp://secunia.com/advisories/24060
secalert@redhat.comhttp://secunia.com/advisories/24067
secalert@redhat.comhttp://secunia.com/advisories/24076
secalert@redhat.comhttp://secunia.com/advisories/24101
secalert@redhat.comhttp://secunia.com/advisories/24140
secalert@redhat.comhttp://secunia.com/advisories/24145
secalert@redhat.comhttp://secunia.com/advisories/24151
secalert@redhat.comhttp://secunia.com/advisories/24188
secalert@redhat.comhttp://secunia.com/advisories/24284
secalert@redhat.comhttp://secunia.com/advisories/24792
secalert@redhat.comhttp://securityreason.com/securityalert/2219
secalert@redhat.comhttp://securitytracker.com/id?1017587
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
secalert@redhat.comhttp://us1.samba.org/samba/security/CVE-2007-0452.html
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1257
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:034
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0060.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-0061.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/459167/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/459365/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/22395
secalert@redhat.comhttp://www.trustix.org/errata/2007/0007
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-419-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/0483
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1278
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/32301
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-1005
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9758
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/cms/node/2579
af854a3a-2127-422b-91ae-364da2661108http://fedoranews.org/cms/node/2580
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2007-Feb/0002.html
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/33100
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24021
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24030
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24046
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24060
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24067
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24076
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24101
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24140
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24145
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24151
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24188
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24284
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24792
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/2219
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017587
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1
af854a3a-2127-422b-91ae-364da2661108http://us1.samba.org/samba/security/CVE-2007-0452.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1257
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:034
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0060.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-0061.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/459167/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/459365/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/22395
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0007
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-419-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0483
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1278
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/32301
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1005
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9758
Impacted products
Vendor Product Version
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14a
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop."
    },
    {
      "lang": "es",
      "value": "smbd en Samba 3.0.6 hasta 3.0.23d permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (agotamiento de memoria y CPU) renombrando un archivo de una forma que previene que una petici\u00f3n sea eliminada de la cola abierta referenciada, lo cual dispara un bucle infinito."
    }
  ],
  "id": "CVE-2007-0452",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-02-06T02:28:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://fedoranews.org/cms/node/2579"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://fedoranews.org/cms/node/2580"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.suse.com/archive/suse-security-announce/2007-Feb/0002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/33100"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24021"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24030"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24046"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24060"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24067"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24076"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24101"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24140"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24145"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24151"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24188"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24284"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24792"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securityreason.com/securityalert/2219"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1017587"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://us1.samba.org/samba/security/CVE-2007-0452.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2007/dsa-1257"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:034"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0060.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0061.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/459167/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/22395"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.trustix.org/errata/2007/0007"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-419-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/0483"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/1278"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32301"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-1005"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9758"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://fedoranews.org/cms/node/2579"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://fedoranews.org/cms/node/2580"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00943462"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.suse.com/archive/suse-security-announce/2007-Feb/0002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/33100"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24030"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24046"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24067"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24140"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24188"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24792"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/2219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017587"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://us1.samba.org/samba/security/CVE-2007-0452.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:034"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0060.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-0061.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/459167/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/22395"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-419-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1278"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32301"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9758"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-06-17 16:30
Modified
2025-04-11 00:51
Severity ?
Summary
Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
References
secalert@redhat.comhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=873Broken Link
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2010//Aug/msg00003.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=129138831608422&w=2Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=129138831608422&w=2Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=130835366526620&w=2Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=130835366526620&w=2Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=samba-announce&m=127668712312761&w=2Mailing List, Patch, Third Party Advisory
secalert@redhat.comhttp://osvdb.org/65518Broken Link
secalert@redhat.comhttp://secunia.com/advisories/40145Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/40210Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/40221Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/40293Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/42319Third Party Advisory
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.471914Mailing List, Third Party Advisory
secalert@redhat.comhttp://support.apple.com/kb/HT4312Third Party Advisory
secalert@redhat.comhttp://ubuntu.com/usn/usn-951-1Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2010/dsa-2061Third Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:119Third Party Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0488.htmlThird Party Advisory
secalert@redhat.comhttp://www.samba.org/samba/ftp/history/samba-3.3.13.htmlVendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patchPatch, Vendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patchPatch, Vendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2010-2063.htmlVendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/40884Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id?1024107Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1486Permissions Required
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1504Permissions Required
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1505Permissions Required
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1507Permissions Required
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1517Permissions Required
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/3063Permissions Required
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/59481Third Party Advisory, VDB Entry
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12427Third Party Advisory
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7115Third Party Advisory
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=873Broken Link
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=129138831608422&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=129138831608422&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=130835366526620&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=130835366526620&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=samba-announce&m=127668712312761&w=2Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/65518Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40145Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40210Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40221Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/40293Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42319Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2010&m=slackware-security.471914Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4312Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-951-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2010/dsa-2061Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:119Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0488.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/ftp/history/samba-3.3.13.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patchPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patchPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2010-2063.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/40884Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1024107Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1486Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1504Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1505Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1507Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1517Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/3063Permissions Required
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/59481Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12427Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7115Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F649D30-D6AF-4DFE-B84A-A15F2EAA5103",
              "versionEndIncluding": "3.3.12",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en la implementaci\u00f3n del paquete SMB1 en la funci\u00f3n chain_reply en process.c en smbd en Samba v3.0.x anterior v3.3.13 permite a atacantes remotos causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria o ca\u00edda de demonio) o probablemente ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un campo manipulado en un paquete. \r\n"
    }
  ],
  "id": "CVE-2010-2063",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-06-17T16:30:01.983",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=873"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=129138831608422\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=129138831608422\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=samba-announce\u0026m=127668712312761\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/65518"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/40145"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/40210"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/40221"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/40293"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/42319"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.471914"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT4312"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://ubuntu.com/usn/usn-951-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2010/dsa-2061"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:119"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0488.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/history/samba-3.3.13.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2010-2063.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/40884"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1024107"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1486"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1504"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1505"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1507"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1517"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/3063"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59481"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12427"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7115"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=873"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=129138831608422\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=129138831608422\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=samba-announce\u0026m=127668712312761\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/65518"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/40145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/40210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/40221"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/40293"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/42319"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2010\u0026m=slackware-security.471914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT4312"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://ubuntu.com/usn/usn-951-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2010/dsa-2061"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:119"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0488.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/history/samba-3.3.13.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.0.37-CVE-2010-2063.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/ftp/patches/security/samba-3.3.12-CVE-2010-2063.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2010-2063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/40884"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1024107"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1486"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1504"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1505"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1507"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1517"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/3063"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/59481"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12427"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9859"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-21 18:15
Modified
2024-11-21 06:30
Summary
All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed.
Impacted products
Vendor Product Version
samba samba *
redhat storage 3.0
fedoraproject fedora 34
fedoraproject fedora 35



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E56E41B-B1B7-48E8-ACFE-D40C28FB8FD7",
              "versionEndExcluding": "4.15.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "379A5883-F6DF-41F5-9403-8D17F6605737",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "All versions of Samba prior to 4.15.5 are vulnerable to a malicious client using a server symlink to determine if a file or directory exists in an area of the server file system not exported under the share definition. SMB1 with unix extensions has to be enabled in order for this attack to succeed."
    },
    {
      "lang": "es",
      "value": "Todas las versiones de Samba anteriores a 4.15.5, son vulnerables a que un cliente malicioso use un enlace simb\u00f3lico del servidor para determinar si un archivo o directorio se presenta en un \u00e1rea del sistema de archivos del servidor no exportada bajo la definici\u00f3n de recurso compartido. SMB1 con extensiones unix debe estar habilitado para que este ataque tenga \u00e9xito"
    }
  ],
  "id": "CVE-2021-44141",
  "lastModified": "2024-11-21T06:30:25.493",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-21T18:15:08.493",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2021-44141.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2021-44141.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-02 23:15
Modified
2024-11-21 06:22
Summary
In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called 'association groups'. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credentials state was only pointed at, and when one connection within that association group ended, the database would be left pointing at an invalid 'struct session_info'. The most likely outcome here is a crash, but it is possible that the use-after-free could instead allow different user state to be pointed at and this might allow more privileged access.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90E25F32-0EA6-4663-8031-D7473716820A",
              "versionEndExcluding": "4.13.14",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BD5F53-14DC-4BBF-8E5D-A1DBD24B5F02",
              "versionEndExcluding": "4.14.10",
              "versionStartIncluding": "4.14.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F33C9B3-33EE-431B-93CF-B738D05BBD0A",
              "versionEndExcluding": "4.15.2",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In DCE/RPC it is possible to share the handles (cookies for resource state) between multiple connections via a mechanism called \u0027association groups\u0027. These handles can reference connections to our sam.ldb database. However while the database was correctly shared, the user credentials state was only pointed at, and when one connection within that association group ended, the database would be left pointing at an invalid \u0027struct session_info\u0027. The most likely outcome here is a crash, but it is possible that the use-after-free could instead allow different user state to be pointed at and this might allow more privileged access."
    },
    {
      "lang": "es",
      "value": "En DCE/RPC es posible compartir los manejadores (cookies para el estado de los recursos) entre m\u00faltiples conexiones por medio de un mecanismo llamado \"association groups\". Estos manejadores pueden hacer referencia a conexiones a nuestra base de datos sam.ldb. Sin embargo, mientras la base de datos era compartida correctamente, el estado de las credenciales del usuario s\u00f3lo era apuntado, y cuando una conexi\u00f3n dentro de ese grupo de asociaci\u00f3n terminaba, la base de datos quedaba apuntando a una \"struct session_info\" no v\u00e1lida. El resultado m\u00e1s probable en este caso es un bloqueo, pero es posible que un uso de memoria previamente liberada permita apuntar a un estado de usuario diferente y esto podr\u00eda permitir un acceso m\u00e1s privilegiado"
    }
  ],
  "id": "CVE-2021-3738",
  "lastModified": "2024-11-21T06:22:17.873",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-02T23:15:09.070",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021726"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14468"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2021-3738.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021726"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14468"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2021-3738.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-06 18:15
Modified
2024-11-21 05:02
Summary
A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1851298%3B
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2020/11/msg00041.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/
secalert@redhat.comhttps://security.gentoo.org/glsa/202007-15Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20200709-0003/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/4454-1/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/4454-2/Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2020-14303.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1851298%3B
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/11/msg00041.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202007-15Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200709-0003/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4454-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4454-2/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2020-14303.htmlVendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2F67C7B-A323-4396-8CA1-0F81CA18E3B4",
              "versionEndExcluding": "4.10.17",
              "versionStartIncluding": "4.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE656EC4-DE4C-4921-A22D-88C9CEDFFECB",
              "versionEndExcluding": "4.11.11",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D8FF3AF-B703-4021-8156-3D767FA10B8E",
              "versionEndExcluding": "4.12.4",
              "versionStartIncluding": "4.12.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in the AD DC NBT server in all Samba versions before 4.10.17, before 4.11.11 and before 4.12.4. A samba user could send an empty UDP packet to cause the samba server to crash."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo en el servidor AD DC NBT en todas las versiones de Samba anteriores a 4.10.17, anteriores a 4.11.11 y anteriores a 4.12.4. Un usuario de samba podr\u00eda enviar un paquete UDP vac\u00edo para hacer que el servidor de samba se bloquee"
    }
  ],
  "id": "CVE-2020-14303",
  "lastModified": "2024-11-21T05:02:57.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-06T18:15:20.323",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851298%3B"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202007-15"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200709-0003/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4454-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4454-2/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-14303.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1851298%3B"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202007-15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200709-0003/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4454-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4454-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-14303.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-834"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-03 08:15
Modified
2024-11-21 08:34
Summary
A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module "acl_xattr" is configured with "acl_xattr:ignore system acls = yes". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba's permissions.
References
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:6209Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:6744Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7371
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7408
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7464
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7467
secalert@redhat.comhttps://access.redhat.com/security/cve/CVE-2023-4091Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=2241882Issue Tracking
secalert@redhat.comhttps://bugzilla.samba.org/show_bug.cgi?id=15439Issue Tracking
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2023-4091.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:6209Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:6744Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7371
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7408
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7464
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7467
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/CVE-2023-4091Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2241882Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=15439Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20231124-0002/
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2023-4091.htmlVendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C9913F9-D46D-4CE3-AA78-E50D32779971",
              "versionEndExcluding": "4.17.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A33312F-1523-4647-83DA-6DD6231906F9",
              "versionEndExcluding": "4.18.8",
              "versionStartIncluding": "4.18.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE496104-DDB5-4709-8026-C83E99B0C865",
              "versionEndExcluding": "4.19.1",
              "versionStartIncluding": "4.19.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "379A5883-F6DF-41F5-9403-8D17F6605737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DDA3E5A-8754-4C48-9A27-E2415F8A6000",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability was discovered in Samba, where the flaw allows SMB clients to truncate files, even with read-only permissions when the Samba VFS module \"acl_xattr\" is configured with \"acl_xattr:ignore system acls = yes\". The SMB protocol allows opening files when the client requests read-only access but then implicitly truncates the opened file to 0 bytes if the client specifies a separate OVERWRITE create disposition request. The issue arises in configurations that bypass kernel file system permissions checks, relying solely on Samba\u0027s permissions."
    },
    {
      "lang": "es",
      "value": "Se descubri\u00f3 una vulnerabilidad en Samba, donde la falla permite a los clientes SMB truncar archivos, incluso con permisos de solo lectura cuando el m\u00f3dulo Samba VFS \"acl_xattr\" est\u00e1 configurado con \"acl_xattr:ignore system acls = yes\". El protocolo SMB permite abrir archivos cuando el cliente solicita acceso de solo lectura, pero luego trunca impl\u00edcitamente el archivo abierto a 0 bytes si el cliente especifica una solicitud de disposici\u00f3n de creaci\u00f3n de SOBRESCRITURA separada. El problema surge en configuraciones que omiten las comprobaciones de permisos del sistema de archivos del kernel y dependen \u00fanicamente de los permisos de Samba."
    }
  ],
  "id": "CVE-2023-4091",
  "lastModified": "2024-11-21T08:34:22.283",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-03T08:15:08.197",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6209"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6744"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2023:7371"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2023:7408"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2023:7464"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2023:7467"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-4091"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241882"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=15439"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-4091.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6209"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6744"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2023:7371"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2023:7408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2023:7464"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2023:7467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-4091"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=15439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20231124-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-4091.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-18 18:15
Modified
2024-11-21 05:18
Summary
A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
fedoraproject fedora 35



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90E25F32-0EA6-4663-8031-D7473716820A",
              "versionEndExcluding": "4.13.14",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BD5F53-14DC-4BBF-8E5D-A1DBD24B5F02",
              "versionEndExcluding": "4.14.10",
              "versionStartIncluding": "4.14.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F33C9B3-33EE-431B-93CF-B738D05BBD0A",
              "versionEndExcluding": "4.15.2",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in the way samba, as an Active Directory Domain Controller, is able to support an RODC (read-only domain controller). This would allow an RODC to print administrator tickets."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo en la forma en que samba, como controlador de dominio de Active Directory, es capaz de soportar un RODC (controlador de dominio de s\u00f3lo lectura). Esto permitir\u00eda a un RODC imprimir tickets de administrador"
    }
  ],
  "id": "CVE-2020-25718",
  "lastModified": "2024-11-21T05:18:33.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-18T18:15:08.487",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019726"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-25718.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019726"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-25718.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-862"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-04-03 23:15
Modified
2025-02-13 15:15
Summary
The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba 4.18.0
samba samba 4.18.0
samba samba 4.18.0
samba samba 4.18.0
samba samba 4.18.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4199E7A4-284A-45D7-84C7-AF0141FD94EE",
              "versionEndExcluding": "4.16.10",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F914D5D-6211-4CF3-87AB-71284AD225A3",
              "versionEndExcluding": "4.17.7",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "D9A6E955-CE26-405F-9468-4557A256CA8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E9604B46-FDA2-4CA1-971F-315AFD250033",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1C209E4C-098B-4D49-A21B-AC8154FE3D85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "2849132A-18B1-4A49-8B2E-8B6DCFCC0501",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.18.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "F657608C-18FB-49FA-A73E-F9BF5CD95B17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Samba AD DC administration tool, when operating against a remote LDAP server, will by default send new or reset passwords over a signed-only connection."
    },
    {
      "lang": "es",
      "value": "La herramienta de administraci\u00f3n Samba AD DC, cuando opera contra un servidor LDAP remoto, enviar\u00e1 por defecto contrase\u00f1as nuevas o restablecidas a trav\u00e9s de una conexi\u00f3n firmada."
    }
  ],
  "id": "CVE-2023-0922",
  "lastModified": "2025-02-13T15:15:12.780",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 4.2,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-04-03T23:15:07.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-0922.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YXBPYIA4VWNOD437NAHZ3NXKAETLFB5S/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230406-0007/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-0922.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-319"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-319"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-20 15:15
Modified
2024-11-21 08:07
Summary
A Type Confusion vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves.
References
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:6667Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7139Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2024:0423
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2024:0580
secalert@redhat.comhttps://access.redhat.com/security/cve/CVE-2023-34967Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=2222794Issue Tracking
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2023-34967.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:6667Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7139Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2024:0423
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2024:0580
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/CVE-2023-34967Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2222794Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20230731-0010/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5477
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2023-34967.htmlVendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7744EB5C-BA2E-4B42-9C28-DD0D4C234C3B",
              "versionEndExcluding": "4.16.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A197EF-100E-4683-AA59-E0855CBCE38B",
              "versionEndExcluding": "4.17.10",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55333C2A-E0E6-40A7-B655-93F05D6745AD",
              "versionEndExcluding": "4.18.5",
              "versionStartIncluding": "4.18.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Type Confusion vulnerability was found in Samba\u0027s mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets, one encoded data structure is a key-value style dictionary where the keys are character strings, and the values can be any of the supported types in the mdssvc protocol. Due to a lack of type checking in callers of the dalloc_value_for_key() function, which returns the object associated with a key, a caller may trigger a crash in talloc_get_size() when talloc detects that the passed-in pointer is not a valid talloc pointer. With an RPC worker process shared among multiple client connections, a malicious client or attacker can trigger a process crash in a shared RPC mdssvc worker process, affecting all other clients this worker serves."
    }
  ],
  "id": "CVE-2023-34967",
  "lastModified": "2024-11-21T08:07:44.293",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-20T15:15:11.410",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6667"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:7139"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:0423"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:0580"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-34967"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222794"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-34967.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:7139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:0423"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:0580"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-34967"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20230731-0010/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2023/dsa-5477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-34967.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-843"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-07-12 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Race condition in Samba smbmnt allows local users to mount file systems in arbitrary locations.
Impacted products
Vendor Product Version
samba samba 2.0.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "93AF43FA-9947-4F26-96E8-1D77BF909AA0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Race condition in Samba smbmnt allows local users to mount file systems in arbitrary locations."
    }
  ],
  "id": "CVE-1999-0812",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-07-12T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0812"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0812"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-02-06 02:28
Modified
2025-04-09 00:30
Severity ?
Summary
Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping.
References
secalert@redhat.comhttp://osvdb.org/33101
secalert@redhat.comhttp://secunia.com/advisories/24021Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24046Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24060Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24067Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24101Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24145Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/24151Vendor Advisory
secalert@redhat.comhttp://securitytracker.com/id?1017588
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
secalert@redhat.comhttp://us1.samba.org/samba/security/CVE-2007-0454.html
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1257
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
secalert@redhat.comhttp://www.kb.cert.org/vuls/id/649732US Government Resource
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:034
secalert@redhat.comhttp://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/459179/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/459365/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/22403Patch
secalert@redhat.comhttp://www.trustix.org/errata/2007/0007
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-419-1
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/0483Vendor Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/32304
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-1005
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/33101
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24021Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24046Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24060Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24067Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24101Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24145Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24151Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017588
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
af854a3a-2127-422b-91ae-364da2661108http://us1.samba.org/samba/security/CVE-2007-0454.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1257
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/649732US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:034
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/459179/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/459365/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/22403Patch
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0007
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-419-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0483Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/32304
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1005



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:alpha:*:*:*:*:*",
              "matchCriteriaId": "A6B060E4-B5A6-4469-828E-211C52542547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:arm:*:*:*:*:*",
              "matchCriteriaId": "974C3541-990C-4CD4-A05A-38FA74A84632",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:hppa:*:*:*:*:*",
              "matchCriteriaId": "6CBF1E0F-C7F3-4F83-9E60-6E63FA7D2775",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-32:*:*:*:*:*",
              "matchCriteriaId": "58792F77-B06F-4780-BA25-FE1EE6C3FDD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:ia-64:*:*:*:*:*",
              "matchCriteriaId": "C9419322-572F-4BB6-8416-C5E96541CF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:m68k:*:*:*:*:*",
              "matchCriteriaId": "BFC50555-C084-46A3-9C9F-949C5E3BB448",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:mips:*:*:*:*:*",
              "matchCriteriaId": "9C25D6E1-D283-4CEA-B47B-60C47A5C0797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:mipsel:*:*:*:*:*",
              "matchCriteriaId": "AD18A446-C634-417E-86AC-B19B6DDDC856",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:ppc:*:*:*:*:*",
              "matchCriteriaId": "E4BB852E-61B2-4842-989F-C6C0C901A8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:s-390:*:*:*:*:*",
              "matchCriteriaId": "24DD9D59-E2A2-4116-A887-39E8CC2004FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "F28D7457-607E-4E0C-909A-413F91CFCD82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:alpha:*:*:*:*:*",
              "matchCriteriaId": "5BF84240-1881-4EFB-BB2F-F9CE8AD09C7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:amd64:*:*:*:*:*",
              "matchCriteriaId": "AF8AE8C4-810F-41AB-A251-5A2D4DD6884D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:arm:*:*:*:*:*",
              "matchCriteriaId": "5EACF214-FA27-44FF-A431-927AB79377A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:hppa:*:*:*:*:*",
              "matchCriteriaId": "E2B58895-0E2A-4466-9CB2-0083349A83B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-32:*:*:*:*:*",
              "matchCriteriaId": "03F8220A-9B1C-40AA-AEAB-F9A93225FBD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:ia-64:*:*:*:*:*",
              "matchCriteriaId": "2311919C-7864-469D-B0F6-9B11D8D0A1C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:m68k:*:*:*:*:*",
              "matchCriteriaId": "19876495-4C1A-487C-955A-C5AA46362A1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:mips:*:*:*:*:*",
              "matchCriteriaId": "D75286DD-50BC-4B72-8AC8-E20730124DC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:mipsel:*:*:*:*:*",
              "matchCriteriaId": "1998C972-497E-4916-B50E-FB32303EEA8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:ppc:*:*:*:*:*",
              "matchCriteriaId": "A6CD3DD9-3A8A-4716-A2D1-136A790AFF94",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:s-390:*:*:*:*:*",
              "matchCriteriaId": "6CE2020A-4FB2-4FCD-8561-7BD147CD95EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "08E90AFA-C262-46D0-B60E-26B67C9602D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:*",
              "matchCriteriaId": "597094EC-D23F-4EC4-A140-96F287679124",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux:2006:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "07EC6C5A-33C9-456A-A8C9-0DF67C76041E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BB0B27C-04EA-426F-9016-7406BACD91DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "BB2B1BA5-8370-4281-B5C9-3D4FE6C70FBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "94F65351-C2DA-41C0-A3F9-1AE951E4386E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "1B795F9F-AFB3-4A2A-ABC6-9246906800DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7F55B87-1876-4855-9F62-9D6E2D295588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:mandrakesoft:mandrake_linuxsoft_2007:*:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "2A0D5740-DD4E-408C-B70F-FD1E7626E1DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Format string vulnerability in the afsacl.so VFS module in Samba 3.0.6 through 3.0.23d allows context-dependent attackers to execute arbitrary code via format string specifiers in a filename on an AFS file system, which is not properly handled during Windows ACL mapping."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de cadena de formato en el m\u00f3dulo VFS afsacl.so en Samba versi\u00f3n 3.0.6 hasta 3.0.23d permite a los atacantes dependiendo del contexto ejecutar c\u00f3digo arbitrario por medio de especificadores de cadena de formato en un nombre de archivo sobre un sistema de archivos AFS, que no se maneja apropiadamente durante la asignaci\u00f3n ACL de Windows."
    }
  ],
  "id": "CVE-2007-0454",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-02-06T02:28:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/33101"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24021"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24046"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24060"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24067"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24101"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24145"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24151"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1017588"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://us1.samba.org/samba/security/CVE-2007-0454.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2007/dsa-1257"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/649732"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:034"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/459179/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/22403"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.trustix.org/errata/2007/0007"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-419-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0483"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32304"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-1005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/33101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24046"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24067"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://us1.samba.org/samba/security/CVE-2007-0454.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200702-01.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/649732"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:034"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/459179/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/22403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-419-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/0483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32304"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1005"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Not vulnerable. These issues affect the AFS ACL module which is not distributed with Samba in Red Hat Enterprise Linux 2.1, 3, 4, or 5.",
      "lastModified": "2007-05-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-134"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-10-07 18:30
Modified
2025-04-09 00:30
Severity ?
Summary
smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://news.samba.org/releases/3.0.37/Vendor Advisory
secalert@redhat.comhttp://news.samba.org/releases/3.2.15/Vendor Advisory
secalert@redhat.comhttp://news.samba.org/releases/3.3.8/Vendor Advisory
secalert@redhat.comhttp://news.samba.org/releases/3.4.2/Vendor Advisory
secalert@redhat.comhttp://osvdb.org/58519Broken Link
secalert@redhat.comhttp://samba.org/samba/security/CVE-2009-2906.htmlVendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/36893Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/36918Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/36937Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/36953Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/37428Third Party Advisory
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439Patch, Third Party Advisory
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1Broken Link
secalert@redhat.comhttp://support.apple.com/kb/HT4077Third Party Advisory
secalert@redhat.comhttp://wiki.rpath.com/Advisories:rPSA-2009-0145Third Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/507856/100/0/threadedThird Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/bid/36573Patch, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id?1022976Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-839-1Patch, Third Party Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/2810Patch, Third Party Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/53575Third Party Advisory, VDB Entry
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7090Third Party Advisory
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944Third Party Advisory
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.htmlPatch, Third Party Advisory
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.0.37/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.2.15/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.3.8/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.4.2/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/58519Broken Link
af854a3a-2127-422b-91ae-364da2661108http://samba.org/samba/security/CVE-2009-2906.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36893Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36918Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36937Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36953Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37428Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1Broken Link
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4077Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2009-0145Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/507856/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/36573Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022976Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-839-1Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2810Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/53575Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7090Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.htmlPatch, Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BC40E8A-9CDA-4574-AAF2-792EB0B55B79",
              "versionEndExcluding": "3.0.37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "836C7AC0-CAE0-459A-A8A5-AA60DFD693CE",
              "versionEndExcluding": "3.2.15",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C888EF-28BF-44BF-9E47-564B0C3222F4",
              "versionEndExcluding": "3.3.8",
              "versionStartIncluding": "3.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4747CC68-FAF4-482F-929A-9DA6C24CB663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet."
    },
    {
      "lang": "es",
      "value": "smbd en Samba v3.0 anterior a v3.0.37, v3.2  anterior a v3.2.15, v3.3  anterior a v3.3.8 y v3.4 anterior a v3.4.2, permite a usuarios autenticados remotamente provocar una denegaci\u00f3n de servicio (bucle infinito) a trav\u00e9s de un  paquete de notificaci\u00f3n de respuesta \"oplock break\" imprevisto."
    }
  ],
  "id": "CVE-2009-2906",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-10-07T18:30:00.860",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.0.37/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.2.15/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.3.8/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.4.2/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/58519"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://samba.org/samba/security/CVE-2009-2906.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36893"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36918"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36937"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36953"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/37428"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/36573"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1022976"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-839-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2810"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53575"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7090"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.0.37/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.2.15/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.3.8/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://news.samba.org/releases/3.4.2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/58519"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://samba.org/samba/security/CVE-2009-2906.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36893"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36953"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/37428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT4077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/36573"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1022976"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-839-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2810"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53575"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7090"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9944"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-835"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-03-13 16:29
Modified
2024-11-21 03:59
Summary
On a Samba 4 AD DC the LDAP server in all versions of Samba from 4.0.0 onwards incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users' passwords, including administrative users and privileged service accounts (eg Domain Controllers).
References
secalert@redhat.comhttp://www.securityfocus.com/bid/103382Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1040494Third Party Advisory, VDB Entry
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1553553Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2019/04/msg00013.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/201805-07Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20180313-0001/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/3595-1/Third Party Advisory
secalert@redhat.comhttps://www.debian.org/security/2018/dsa-4135Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2018-1057.htmlMitigation, Vendor Advisory
secalert@redhat.comhttps://www.synology.com/support/security/Synology_SA_18_08Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/103382Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1040494Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1553553Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/04/msg00013.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201805-07Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20180313-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3595-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2018/dsa-4135Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2018-1057.htmlMitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/support/security/Synology_SA_18_08Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:lts:*:*:*",
              "matchCriteriaId": "A0B1E5F7-5866-424F-B6E6-C7D1DC747DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C46F9B88-6D5A-4C14-B7ED-A6DE9E3A7E69",
              "versionEndExcluding": "4.5.16",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "908F420E-C970-44FA-8FAB-F05C73E276EB",
              "versionEndExcluding": "4.6.14",
              "versionStartIncluding": "4.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5516C6B6-6886-42BB-9109-3684575091D4",
              "versionEndExcluding": "4.7.6",
              "versionStartIncluding": "4.7.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "On a Samba 4 AD DC the LDAP server in all versions of Samba from 4.0.0 onwards incorrectly validates permissions to modify passwords over LDAP allowing authenticated users to change any other users\u0027 passwords, including administrative users and privileged service accounts (eg Domain Controllers)."
    },
    {
      "lang": "es",
      "value": "En Samba 4 AD DC, el servidor LDAP en todas las versiones de Samba, desde la 4.0.0 en adelante, valida incorrectamente los permisos para modificar contrase\u00f1as por LDAP. Esto permite que usuarios autenticados cambien las contrase\u00f1as de cualquier otro usuario, incluyendo usuarios administrativos y cuentas de servicio privilegiadas (por ejemplo, Domain Controllers)."
    }
  ],
  "id": "CVE-2018-1057",
  "lastModified": "2024-11-21T03:59:05.140",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-03-13T16:29:00.287",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103382"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1040494"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553553"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-07"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180313-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3595-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4135"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-1057.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/support/security/Synology_SA_18_08"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/103382"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1040494"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1553553"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-07"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180313-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3595-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-1057.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/support/security/Synology_SA_18_08"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-863"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-03-14 10:55
Modified
2025-04-12 10:46
Severity ?
Summary
Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts.
References
secalert@redhat.comhttp://advisories.mageia.org/MGASA-2014-0138.htmlThird Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-03/msg00062.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2014-03/msg00063.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2014-0330.htmlThird Party Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-201502-15.xmlThird Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2015:082Third Party Advisory
secalert@redhat.comhttp://www.samba.org/samba/history/samba-3.6.23.htmlVendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/history/samba-4.0.16.htmlVendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/history/samba-4.1.6.htmlVendor Advisory
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2013-4496Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/66336Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2156-1Third Party Advisory
secalert@redhat.comhttps://bugzilla.samba.org/show_bug.cgi?id=10245Issue Tracking, Vendor Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://advisories.mageia.org/MGASA-2014-0138.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2014-0330.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201502-15.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2015:082Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/history/samba-3.6.23.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/history/samba-4.0.16.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/history/samba-4.1.6.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2013-4496Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/66336Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2156-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=10245Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1302899F-16AA-4F83-B8D3-379D2C7AFD43",
              "versionEndExcluding": "3.6.23",
              "versionStartIncluding": "3.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01499B01-7131-46E1-AD87-9B3A5E9CF8C0",
              "versionEndExcluding": "4.0.16",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D43DC640-E856-4640-B63A-C7767CDEF55E",
              "versionEndExcluding": "4.1.6",
              "versionStartIncluding": "4.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2076871-2E80-4605-A470-A41C1A8EC7EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F61F047-129C-41A6-8A27-FFCBB8563E91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 3.x before 3.6.23, 4.0.x before 4.0.16, and 4.1.x before 4.1.6 does not enforce the password-guessing protection mechanism for all interfaces, which makes it easier for remote attackers to obtain access via brute-force ChangePasswordUser2 (1) SAMR or (2) RAP attempts."
    },
    {
      "lang": "es",
      "value": "Samba 3.x anterior a 3.6.23, 4.0.x anterior a 4.0.16 y 4.1.x anterior a 4.1.6 no fuerza el mecanismo de protecci\u00f3n de adivinaci\u00f3n de contrase\u00f1a para todas las interfaces, lo que facilita a atacantes remotos obtener acceso a trav\u00e9s de intentos de fuerza bruta de ChangePasswordUser2 (1) SAMR o (2) RAP."
    }
  ],
  "id": "CVE-2013-4496",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-03-14T10:55:05.177",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://advisories.mageia.org/MGASA-2014-0138.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0330.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-3.6.23.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-4.0.16.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-4.1.6.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-4496"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/66336"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2156-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=10245"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://advisories.mageia.org/MGASA-2014-0138.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-August/136864.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134717.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00062.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2014-0330.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:082"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-3.6.23.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-4.0.16.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/history/samba-4.1.6.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-4496"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/66336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2156-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=10245"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-255"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-28 14:29
Modified
2024-11-21 03:53
Summary
Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba's KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with talloc_free() and directly calls abort(), terminating the KDC process.
References
secalert@redhat.comhttp://www.securityfocus.com/bid/106023Third Party Advisory, VDB Entry
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/202003-52Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20181127-0001/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/3827-1/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/3827-2/Third Party Advisory
secalert@redhat.comhttps://www.debian.org/security/2018/dsa-4345Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2018-16841.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/106023Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202003-52Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20181127-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3827-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3827-2/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2018/dsa-4345Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2018-16841.htmlPatch, Vendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD5FEE5-66AE-4A6D-9ACC-0D1DBDCC3542",
              "versionEndExcluding": "4.7.12",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "952E46DC-D32E-4695-B835-19D07898713A",
              "versionEndExcluding": "4.8.7",
              "versionStartIncluding": "4.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6711DD48-1D71-4F14-A071-8A3F08D84162",
              "versionEndExcluding": "4.9.3",
              "versionStartIncluding": "4.9.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C312A0-CD2C-4B9C-B064-6409B25C278F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba\u0027s KDC will call talloc_free() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with talloc_free() and directly calls abort(), terminating the KDC process."
    },
    {
      "lang": "es",
      "value": "Samba, desde la versi\u00f3n 4.3.0 antes de las versiones 4.7.12, 4.8.7 y 4.9.3, es vulnerable a una denegaci\u00f3n de servicio (DoS). Cuando se configura para aceptar la autenticaci\u00f3n por smartcard, el KDC de Samba llamar\u00e1 a talloc_free() dos veces en la misma memoria si la entidad de seguridad en un certificado firmado de forma v\u00e1lida no coincide con la entidad en AS-REQ. Esto solo es posible tras la autenticaci\u00f3n con un certificado de confianza. talloc es resistente a corrupci\u00f3n de una doble liberaci\u00f3n (double free) con talloc_free() y llama directamente a abort(), terminando el proceso KDC."
    }
  ],
  "id": "CVE-2018-16841",
  "lastModified": "2024-11-21T03:53:25.367",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-28T14:29:00.347",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106023"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20181127-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3827-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3827-2/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4345"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-16841.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/106023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16841"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20181127-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3827-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3827-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-16841.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-415"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-23 16:15
Modified
2024-11-21 06:22
Summary
MaxQueryDuration not honoured in Samba AD DC LDAP
References
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=2077533Issue Tracking, Patch, Third Party Advisory
secalert@redhat.comhttps://bugzilla.samba.org/show_bug.cgi?id=14694Issue Tracking, Patch, Vendor Advisory
secalert@redhat.comhttps://gitlab.com/samba-team/samba/-/commit/1d5b155619bc532c46932965b215bd73a920e56fPatch, Third Party Advisory
secalert@redhat.comhttps://gitlab.com/samba-team/samba/-/commit/2b3af3b560c9617a233c131376c870fce146c002Patch, Third Party Advisory
secalert@redhat.comhttps://gitlab.com/samba-team/samba/-/commit/3507e96b3dcf0c0b8eff7b2c08ffccaf0812a393Patch, Third Party Advisory
secalert@redhat.comhttps://gitlab.com/samba-team/samba/-/commit/5f0590362c5c0c5ee20503a67467f9be2d50e73bPatch, Third Party Advisory
secalert@redhat.comhttps://gitlab.com/samba-team/samba/-/commit/86fe9d48883f87c928bf31ccbd275db420386803Patch, Third Party Advisory
secalert@redhat.comhttps://gitlab.com/samba-team/samba/-/commit/dcfcafdbf756e12d9077ad7920eea25478c29f81Patch, Third Party Advisory
secalert@redhat.comhttps://gitlab.com/samba-team/samba/-/commit/e1ab0c43629686d1d2c0b0b2bcdc90057a792049Patch, Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/202309-06
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2077533Issue Tracking, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=14694Issue Tracking, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/samba-team/samba/-/commit/1d5b155619bc532c46932965b215bd73a920e56fPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/samba-team/samba/-/commit/2b3af3b560c9617a233c131376c870fce146c002Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/samba-team/samba/-/commit/3507e96b3dcf0c0b8eff7b2c08ffccaf0812a393Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/samba-team/samba/-/commit/5f0590362c5c0c5ee20503a67467f9be2d50e73bPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/samba-team/samba/-/commit/86fe9d48883f87c928bf31ccbd275db420386803Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/samba-team/samba/-/commit/dcfcafdbf756e12d9077ad7920eea25478c29f81Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://gitlab.com/samba-team/samba/-/commit/e1ab0c43629686d1d2c0b0b2bcdc90057a792049Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202309-06
Impacted products
Vendor Product Version
samba samba *
redhat storage 3.0
fedoraproject fedora 35



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED3DD507-0A0D-4BB9-8789-FB6BBCDEB506",
              "versionStartIncluding": "4.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "379A5883-F6DF-41F5-9403-8D17F6605737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MaxQueryDuration not honoured in Samba AD DC LDAP"
    },
    {
      "lang": "es",
      "value": "MaxQueryDuration no es cumplido en Samba AD DC LDAP"
    }
  ],
  "id": "CVE-2021-3670",
  "lastModified": "2024-11-21T06:22:07.053",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-23T16:15:09.393",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14694"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/1d5b155619bc532c46932965b215bd73a920e56f"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/2b3af3b560c9617a233c131376c870fce146c002"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/3507e96b3dcf0c0b8eff7b2c08ffccaf0812a393"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/5f0590362c5c0c5ee20503a67467f9be2d50e73b"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/86fe9d48883f87c928bf31ccbd275db420386803"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/dcfcafdbf756e12d9077ad7920eea25478c29f81"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/e1ab0c43629686d1d2c0b0b2bcdc90057a792049"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2077533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14694"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/1d5b155619bc532c46932965b215bd73a920e56f"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/2b3af3b560c9617a233c131376c870fce146c002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/3507e96b3dcf0c0b8eff7b2c08ffccaf0812a393"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/5f0590362c5c0c5ee20503a67467f9be2d50e73b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/86fe9d48883f87c928bf31ccbd275db420386803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/dcfcafdbf756e12d9077ad7920eea25478c29f81"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://gitlab.com/samba-team/samba/-/commit/e1ab0c43629686d1d2c0b0b2bcdc90057a792049"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Undergoing Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-02-06 02:28
Modified
2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions.
References
secalert@redhat.comhttp://osvdb.org/33098
secalert@redhat.comhttp://secunia.com/advisories/24043
secalert@redhat.comhttp://secunia.com/advisories/24101
secalert@redhat.comhttp://secunia.com/advisories/24151
secalert@redhat.comhttp://securitytracker.com/id?1017589
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
secalert@redhat.comhttp://us1.samba.org/samba/security/CVE-2007-0453.html
secalert@redhat.comhttp://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/459168/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/archive/1/459365/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/22410
secalert@redhat.comhttp://www.trustix.org/errata/2007/0007
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/0483
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/32231
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-1005
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/33098
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24043
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24101
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24151
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017589
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.476916
af854a3a-2127-422b-91ae-364da2661108http://us1.samba.org/samba/security/CVE-2007-0453.html
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/459168/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/459365/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/22410
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0007
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/0483
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/32231
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1005
Impacted products
Vendor Product Version
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the nss_winbind.so.1 library in Samba 3.0.21 through 3.0.23d, as used in the winbindd daemon on Solaris, allows attackers to execute arbitrary code via the (1) gethostbyname and (2) getipnodebyname functions."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en la librer\u00eda nss_winbind.so.1 de Samba 3.0.21 hasta 3.0.23d, como se usa en el demonio winbindd de Solaris, permite a los atacantes ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de las funciones (1) gethostbyame y (2) getipnodebyname."
    }
  ],
  "id": "CVE-2007-0453",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-02-06T02:28:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/33098"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24043"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24101"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/24151"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securitytracker.com/id?1017589"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://us1.samba.org/samba/security/CVE-2007-0453.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/459168/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/22410"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.trustix.org/errata/2007/0007"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/0483"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32231"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-1005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/33098"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017589"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.476916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://us1.samba.org/samba/security/CVE-2007-0453.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/459168/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/459365/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/22410"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0483"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32231"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1005"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Not vulnerable. These issues did not affect Linux versions of Samba.",
      "lastModified": "2007-05-14T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-11-13 15:55
Modified
2025-04-11 00:51
Severity ?
Summary
Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller.
Impacted products
Vendor Product Version
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.1.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 4.0.x before 4.0.11 and 4.1.x before 4.1.1, when LDAP or HTTP is provided over SSL, uses world-readable permissions for a private key, which allows local users to obtain sensitive information by reading the key file, as demonstrated by access to the local filesystem on an AD domain controller."
    },
    {
      "lang": "es",
      "value": "Samba 4.0.x anteriores a 4.0.11 y 4.1.x anteriores a 4.1.1, cuando LDAP o HTTP se proporcionan sobre SSL, utilizan permisos de lectura globales para una clave privada, lo cual permite a ususarios locales obtener informaci\u00f3n sensible mediante la lectura del fichero de la clave, como demostrado al acceder al sistema de ficheros local en un controlador de dominio AD."
    }
  ],
  "id": "CVE-2013-4476",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.2,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 1.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-13T15:55:03.517",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.samba.org/samba/history/samba-4.0.11.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.samba.org/samba/history/samba-4.1.1.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-4476"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-11/msg00083.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-12/msg00088.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201502-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/history/samba-4.0.11.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/history/samba-4.1.1.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-4476"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-09-03 15:15
Modified
2024-11-21 04:18
Summary
A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2019:3253
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2019:4023
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197Issue Tracking, Mitigation, Third Party Advisory
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/
secalert@redhat.comhttps://seclists.org/bugtraq/2019/Sep/4Mailing List, Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/202003-52
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20190903-0001/Third Party Advisory
secalert@redhat.comhttps://support.f5.com/csp/article/K69511801
secalert@redhat.comhttps://support.f5.com/csp/article/K69511801?utm_source=f5support&amp%3Butm_medium=RSS
secalert@redhat.comhttps://usn.ubuntu.com/4121-1/Third Party Advisory
secalert@redhat.comhttps://www.debian.org/security/2019/dsa-4513Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2019-10197.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:3253
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2019:4023
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197Issue Tracking, Mitigation, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Sep/4Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202003-52
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20190903-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.f5.com/csp/article/K69511801
af854a3a-2127-422b-91ae-364da2661108https://support.f5.com/csp/article/K69511801?utm_source=f5support&amp%3Butm_medium=RSS
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4121-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2019/dsa-4513Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2019-10197.htmlVendor Advisory
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba 4.9.0
samba samba 4.9.0
samba samba 4.9.0
samba samba 4.9.0
samba samba 4.9.0
samba samba 4.10.0
samba samba 4.10.0
samba samba 4.10.0
samba samba 4.10.0
samba samba 4.11.0
samba samba 4.11.0
samba samba 4.11.0
samba samba 4.11.0
canonical ubuntu_linux 19.04
debian debian_linux 10.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65C21A32-9985-426A-A16F-30B0F58BA953",
              "versionEndIncluding": "4.9.13",
              "versionStartIncluding": "4.9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FCB3F24-4220-42C4-9896-03AE9C5D6175",
              "versionEndIncluding": "4.10.8",
              "versionStartIncluding": "4.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.9.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "8A746181-E573-4080-A96B-B5C47A00DD96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.9.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "280C0C80-3E4E-4E2A-BEB3-2E17D1B1E675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.9.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "A0D28AE7-4CCD-41DB-9863-FF2990D316F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.9.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "F37B907F-6E7A-4FA4-828C-327AA838AB02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.9.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "C8665763-B246-40DB-92A3-57CFCD4E70F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.10.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "31966B4C-81C4-4C65-B127-A918EA50863E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.10.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BB58CF2F-D1E1-4459-AEC8-A8C3F53D9028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.10.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "846B3FA6-9799-412D-B36E-DE56F889CC7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.10.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "854212A7-CFCE-4C1D-9C9B-8C98C69604B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "36AAA8FC-627F-4928-853C-1B785D1E33C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.11.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D75D1E2C-C220-41E1-903E-5908D8F53373",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.11.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "ACC5280F-160C-4835-A9FB-3D5F625BB073",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.11.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "05A7E021-6CAA-4581-A274-996E0A69967C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in samba versions 4.9.x up to 4.9.13, samba 4.10.x up to 4.10.8 and samba 4.11.x up to 4.11.0rc3, when certain parameters were set in the samba configuration file. An unauthenticated attacker could use this flaw to escape the shared directory and access the contents of directories outside the share."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un error en Samba en las versiones 4.9.x hasta 4.9.13, samba versiones 4.10.x hasta 4.10.8 y samba versiones 4.11.x hasta 4.11.0rc3, cuando ciertos par\u00e1metros se establecieron en el archivo de configuraci\u00f3n de samba. Un atacante no autenticado podr\u00eda usar este defecto para escapar del directorio compartido y acceder al contenido de los directorios fuera del recurso compartido."
    }
  ],
  "id": "CVE-2019-10197",
  "lastModified": "2024-11-21T04:18:38.097",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.5,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-03T15:15:11.223",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2019:3253"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2019:4023"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2019/Sep/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20190903-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://support.f5.com/csp/article/K69511801"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://support.f5.com/csp/article/K69511801?utm_source=f5support\u0026amp%3Butm_medium=RSS"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4121-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2019/dsa-4513"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-10197.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00045.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2019:3253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2019:4023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10197"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/56ZUXHGDHPM7S6RVAKULZT5EATS37OKA/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M7NYIUZOCIDXWXGWMZ7O5Z7OJ6IX7EAB/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z6EEKFT24DQI4DMZMSQTLMNZWG4RMZ57/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://seclists.org/bugtraq/2019/Sep/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20190903-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.f5.com/csp/article/K69511801"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.f5.com/csp/article/K69511801?utm_source=f5support\u0026amp%3Butm_medium=RSS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4121-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2019/dsa-4513"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-10197.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-18 18:15
Modified
2024-11-21 02:47
Summary
A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
debian debian_linux 9.0
debian debian_linux 10.0
fedoraproject fedora 33
fedoraproject fedora 34
fedoraproject fedora 35
redhat codeready_linux_builder -
redhat gluster_storage 3.0
redhat gluster_storage 3.5
redhat openstack 13
redhat openstack 16.1
redhat openstack 16.2
redhat virtualization_host 4.0
redhat enterprise_linux 7.0
redhat enterprise_linux 8.0
redhat enterprise_linux_desktop 7.0
redhat enterprise_linux_eus 8.2
redhat enterprise_linux_eus 8.4
redhat enterprise_linux_for_ibm_z_systems 7.0
redhat enterprise_linux_for_ibm_z_systems 8.0
redhat enterprise_linux_for_ibm_z_systems_eus 8.2
redhat enterprise_linux_for_ibm_z_systems_eus 8.4
redhat enterprise_linux_for_power_big_endian 7.0
redhat enterprise_linux_for_power_little_endian 7.0
redhat enterprise_linux_for_power_little_endian 8.0
redhat enterprise_linux_for_power_little_endian_eus 8.2
redhat enterprise_linux_for_power_little_endian_eus 8.4
redhat enterprise_linux_for_scientific_computing 7.0
redhat enterprise_linux_resilient_storage 7.0
redhat enterprise_linux_server 7.0
redhat enterprise_linux_server_aus 8.2
redhat enterprise_linux_server_aus 8.4
redhat enterprise_linux_server_tus 8.4
redhat enterprise_linux_server_update_services_for_sap_solutions 8.2
redhat enterprise_linux_server_update_services_for_sap_solutions 8.4
redhat enterprise_linux_tus 8.2
redhat enterprise_linux_workstation 7.0
canonical ubuntu_linux 18.04
canonical ubuntu_linux 20.04
canonical ubuntu_linux 21.04
canonical ubuntu_linux 21.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA32EB89-D016-4181-94A6-66872DF23385",
              "versionEndExcluding": "4.13.14",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BD5F53-14DC-4BBF-8E5D-A1DBD24B5F02",
              "versionEndExcluding": "4.14.10",
              "versionStartIncluding": "4.14.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F33C9B3-33EE-431B-93CF-B738D05BBD0A",
              "versionEndExcluding": "4.15.2",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD81C46-328B-412D-AF4E-68A2AD2F1A73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1986832-44C9-491E-A75D-AAD8FAE683E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:gluster_storage:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "135265D8-583D-41EB-B741-419FC871CE91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
              "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D3F4FF-AD3D-4D17-93E8-84CAFCED2F59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openstack:16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "307846C3-F2B3-4E0D-AA31-BCC1444589F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB28F9AF-3D06-4532-B397-96D7E4792503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "831F0F47-3565-4763-B16F-C87B1FF2035E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E3F09B5-569F-4C58-9FCA-3C0953D107B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "566507B6-AC95-47F7-A3FB-C6F414E45F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C21FE1-EA5C-498F-9C6C-D05F91A88217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AB105EC-19F9-424A-86F1-305A6FD74A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9BD9AE-46FC-4609-8D99-A3CFE91D58D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDCFF34-6F1D-45A1-BE37-6A0E17B04801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "47811209-5CE5-4375-8391-B0A7F6A0E420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C80DB2-4A78-4EC9-B2A8-1E4D902C4834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "983533DD-3970-4A37-9A9C-582BD48AA1E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "37CE1DC7-72C5-483C-8921-0B462C8284D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F66BE726-A258-42D7-B23A-925F50FDF449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6897676D-53F9-45B3-B27F-7FF9A4C58D33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28F226A-CBC7-4A32-BE58-398FA5B42481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC10D919-57FD-4725-B8D2-39ECB476902F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3921C1CF-A16D-4727-99AD-03EFFA7C91CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC6DD887-9744-43EA-8B3C-44C6B6339590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C24797C-0397-4D4F-ADC3-3B99095DBB35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EF1C1CC-3FAE-4DE3-BC41-E5B14D5721F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE4D2D0-CEEB-416F-8BC5-A7987DF56190",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in the way samba implemented SMB1 authentication. An attacker could use this flaw to retrieve the plaintext password sent over the wire even if Kerberos authentication was required."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo en la forma en que Samba implementa la autenticaci\u00f3n SMB1. Un atacante podr\u00eda usar este fallo para recuperar la contrase\u00f1a en texto plano enviada a trav\u00e9s del cable, incluso si es requerida la autenticaci\u00f3n Kerberos"
    }
  ],
  "id": "CVE-2016-2124",
  "lastModified": "2024-11-21T02:47:52.757",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-18T18:15:08.237",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2124.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019660"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2124.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2000-12-19 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Samba Web Administration Tool (SWAT) in Samba 2.0.7 does not log login attempts in which the username is correct but the password is wrong, which allows remote attackers to conduct brute force password guessing attacks.
Impacted products
Vendor Product Version
samba samba 2.0.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CB46ABA-F403-4715-915D-870BD221C8FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba Web Administration Tool (SWAT) in Samba 2.0.7 does not log login attempts in which the username is correct but the password is wrong, which allows remote attackers to conduct brute force password guessing attacks."
    }
  ],
  "id": "CVE-2000-0937",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2000-12-19T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1873"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0430.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/1873"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5442"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-02-04 20:15
Modified
2025-04-11 00:51
Severity ?
Summary
client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
Impacted products
Vendor Product Version
samba samba *
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 2.2.0
samba samba 2.2.0a
samba samba 2.2.1
samba samba 2.2.1a
samba samba 2.2.2
samba samba 2.2.3
samba samba 2.2.3a
samba samba 2.2.4
samba samba 2.2.5
samba samba 2.2.6
samba samba 2.2.7
samba samba 2.2.7a
samba samba 2.2.8
samba samba 2.2.8a
samba samba 2.2.9
samba samba 2.2.10
samba samba 2.2.11
samba samba 2.2.12
samba samba 2.2a
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27
samba samba 3.0.27a
samba samba 3.0.28
samba samba 3.0.28a
samba samba 3.0.29
samba samba 3.0.30
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.0.34
samba samba 3.0.35
samba samba 3.0.36
samba samba 3.0.37
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12
samba samba 3.2.13
samba samba 3.2.14
samba samba 3.2.15
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.3.8
samba samba 3.3.9
samba samba 3.3.10
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0717DC8-F4D3-471C-A3EB-75469B3A9558",
              "versionEndIncluding": "3.4.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B50D9E-EA43-44BF-9176-610EC808B986",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p1:*:*:*:*:*:*",
              "matchCriteriaId": "BCBBF662-40C3-4280-BE79-9D7C36A6DF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p2:*:*:*:*:*:*",
              "matchCriteriaId": "59819155-91CF-4B79-BCB2-BE0EBAB4F31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p3:*:*:*:*:*:*",
              "matchCriteriaId": "BDD6A6AE-C636-4131-807B-59F7784B7AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8C6D63F5-B72C-445A-BC61-D52D6022481B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p5:*:*:*:*:*:*",
              "matchCriteriaId": "1ADD724A-1747-4678-A659-0A528B728C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF3C20A1-F21D-41FF-8B87-B50E1AE8219E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p1:*:*:*:*:*:*",
              "matchCriteriaId": "A3ABEA3A-8F88-4947-80A5-CF1459F5AC8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p10:*:*:*:*:*:*",
              "matchCriteriaId": "86F85E94-9F94-457A-A606-35DB558484A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p2:*:*:*:*:*:*",
              "matchCriteriaId": "1ED4704B-2422-43C9-A2E0-9851F56D4CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p3:*:*:*:*:*:*",
              "matchCriteriaId": "158D175A-E0D7-45EF-BDD2-D86F2E8F7766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p4:*:*:*:*:*:*",
              "matchCriteriaId": "7854FCEF-D1F8-4DEC-A6CB-C4470899F71C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p5:*:*:*:*:*:*",
              "matchCriteriaId": "36D8B675-C209-4D5A-8EA7-1B3515E930FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p6:*:*:*:*:*:*",
              "matchCriteriaId": "4BCECF31-4C73-4ABA-9F84-D5DBA1DB1F50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p7:*:*:*:*:*:*",
              "matchCriteriaId": "2C5A1382-D147-43E5-8DB7-93B7A3B9AA0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p8:*:*:*:*:*:*",
              "matchCriteriaId": "3A497A5D-96FC-490E-87EB-94C1BE7338A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65AC9643-E1A5-4013-9607-17C6CC7CC63B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "090E2541-2DBA-41CB-A792-9E703C797949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCACECDD-40F1-4A9B-8B8A-20565FEE3627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F65FF3-71F8-4278-A823-A6E0FF65D9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C71CB60-2689-4A4A-9509-E2F3135E6491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0129E404-3AE8-4F0E-89CB-7F2FA5B47011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "614547F5-9C3F-489B-9B72-91B0FF646CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A052141C-874D-4ED0-99FB-D7468FACFC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9739EA65-9FA8-425E-B355-E690773D5B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B618F94-DAC2-4A97-9F7F-8BCEA3199769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE7C057-B024-4417-B572-5D396366620E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DC3500-F8F0-46E1-B0AA-C2474CCB3DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFCD334C-FB95-41A6-8F4C-FCC4E70CE930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "75C86202-3150-440C-B048-BB039E9D3606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CAF474-0C3A-4E49-8CF8-9DF14D84CDCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3ABF97-93A2-48C3-898E-9DADD5614BF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92304DE-CFBB-4C03-AA7F-54DB3C14ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "04F39AA5-9048-4EE9-B0F2-CE679C673F0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC2AE5A9-62C5-4DCE-85B3-16F48695B3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC24403-E706-4073-A04D-53E1B79B59B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3AA114-63C8-4B25-86BA-73C6933EE21F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string."
    },
    {
      "lang": "es",
      "value": "client/mount.cifs.c en mount.cifs en smbfs en Samba v3.4.5 y anteriores no verifica (1) el nombre de dispositivo (2) cadenas de puntos de montaje compuestas por varios caracteres lo que permite a usuarios locales causar una denegaci\u00f3n de servicio (corrupci\u00f3n mtab) a trav\u00e9s de una cadena manipulada."
    }
  ],
  "id": "CVE-2010-0547",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-02-04T20:15:24.110",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a065c177dfc8f968775593ba00dffafeebb2e054"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/39317"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-201206-29.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:090"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/38326"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/1062"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a065c177dfc8f968775593ba00dffafeebb2e054"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-04/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39317"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201206-29.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:090"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/38326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1062"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks.
Impacted products
Vendor Product Version
apple xcode 1.5
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apple:xcode:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B66C7172-0104-41B7-8291-62B7E72B3AEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76C7EB0C-C0C3-4B43-8AB1-76105351AF69",
              "versionEndIncluding": "2.18.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "distcc 2.x, as used in XCode 1.5 and others, when not configured to restrict access to the server port, allows remote attackers to execute arbitrary commands via compilation jobs, which are executed by the server without authorization checks."
    }
  ],
  "id": "CVE-2004-2687",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2005-03/0183.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://distcc.samba.org/security.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.samba.org/archive/distcc/2004q3/002550.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.samba.org/archive/distcc/2004q3/002562.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.metasploit.org/projects/Framework/exploits.html#distcc_exec"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/13378"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2005-03/0183.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distcc.samba.org/security.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.samba.org/archive/distcc/2004q3/002550.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.samba.org/archive/distcc/2004q3/002562.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.metasploit.org/projects/Framework/exploits.html#distcc_exec"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/13378"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-06 10:15
Modified
2024-11-21 04:18
Summary
A flaw was found in the samba client, all samba versions before samba 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname to the client with separators. This could allow the client to access files and folders outside of the SMB network pathnames. An attacker could use this vulnerability to create files outside of the current working directory using the privileges of the client user.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.htmlThird Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2019-10218.htmlVendor Advisory
secalert@redhat.comhttps://www.synology.com/security/advisory/Synology_SA_19_35
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2019-10218.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/security/advisory/Synology_SA_19_35
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
fedoraproject fedora 29
fedoraproject fedora 31



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F9AD222-3496-4001-9BED-2DA5D23BFD0B",
              "versionEndExcluding": "4.9.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC76A261-FE98-42F2-A791-47FBA16AB791",
              "versionEndExcluding": "4.10.10",
              "versionStartIncluding": "4.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07815BAF-7322-44A3-BE46-EC474DE07238",
              "versionEndExcluding": "4.11.2",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in the samba client, all samba versions before samba 4.11.2, 4.10.10 and 4.9.15, where a malicious server can supply a pathname to the client with separators. This could allow the client to access files and folders outside of the SMB network pathnames. An attacker could use this vulnerability to create files outside of the current working directory using the privileges of the client user."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo en el cliente de samba, todas las versiones de samba anteriores a samba 4.11.2, 4.10.10 y 4.9.15, donde un servidor malicioso puede suministrar un nombre de ruta al cliente con separadores. Esto podr\u00eda permitir al cliente acceder a archivos y carpetas fuera de los nombres de ruta de la red SMB. Un atacante podr\u00eda usar esta vulnerabilidad para crear archivos fuera del directorio de trabajo actual usando los privilegios de usuario del cliente."
    }
  ],
  "id": "CVE-2019-10218",
  "lastModified": "2024-11-21T04:18:40.793",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-06T10:15:10.607",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-10218.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_35"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10218"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-10218.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_35"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-21 15:15
Modified
2025-04-23 19:15
Summary
The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
debian debian_linux 10.0
debian debian_linux 11.0
canonical ubuntu_linux 14.04
canonical ubuntu_linux 16.04
canonical ubuntu_linux 18.04
canonical ubuntu_linux 20.04
canonical ubuntu_linux 21.10
synology diskstation_manager *
fedoraproject fedora 34
fedoraproject fedora 35
redhat codeready_linux_builder -
redhat gluster_storage 3.5
redhat virtualization_host 4.0
redhat enterprise_linux 7.0
redhat enterprise_linux 8.0
redhat enterprise_linux_desktop 7.0
redhat enterprise_linux_eus 8.2
redhat enterprise_linux_eus 8.4
redhat enterprise_linux_for_ibm_z_systems 7.0
redhat enterprise_linux_for_ibm_z_systems 8.0
redhat enterprise_linux_for_ibm_z_systems_eus 8.2
redhat enterprise_linux_for_ibm_z_systems_eus 8.4
redhat enterprise_linux_for_power_big_endian 7.0
redhat enterprise_linux_for_power_little_endian 7.0
redhat enterprise_linux_for_power_little_endian 8.0
redhat enterprise_linux_for_power_little_endian_eus 8.2
redhat enterprise_linux_for_power_little_endian_eus 8.4
redhat enterprise_linux_for_scientific_computing 7.0
redhat enterprise_linux_resilient_storage 7.0
redhat enterprise_linux_server 7.0
redhat enterprise_linux_server 8.1
redhat enterprise_linux_server_aus 8.2
redhat enterprise_linux_server_aus 8.4
redhat enterprise_linux_server_tus 8.2
redhat enterprise_linux_server_tus 8.4
redhat enterprise_linux_server_update_services_for_sap_solutions 8.1
redhat enterprise_linux_server_update_services_for_sap_solutions 8.2
redhat enterprise_linux_server_update_services_for_sap_solutions 8.4
redhat enterprise_linux_workstation 7.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7E470E9-2683-48E5-B8F0-02BBDC7F3231",
              "versionEndExcluding": "4.13.17",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E57F9C0-2EA0-4485-B018-665139BA3F42",
              "versionEndExcluding": "4.14.12",
              "versionStartIncluding": "4.14.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24842378-D0A4-49CC-B4AF-8A1FC74427F8",
              "versionEndExcluding": "4.15.5",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE4D2D0-CEEB-416F-8BC5-A7987DF56190",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6095F8A-383B-46F9-ABBF-74783500B6F1",
              "versionEndExcluding": "6.2.4-25556.4",
              "versionStartIncluding": "6.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD81C46-328B-412D-AF4E-68A2AD2F1A73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:gluster_storage:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "135265D8-583D-41EB-B741-419FC871CE91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB28F9AF-3D06-4532-B397-96D7E4792503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "831F0F47-3565-4763-B16F-C87B1FF2035E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E3F09B5-569F-4C58-9FCA-3C0953D107B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "566507B6-AC95-47F7-A3FB-C6F414E45F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C21FE1-EA5C-498F-9C6C-D05F91A88217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AB105EC-19F9-424A-86F1-305A6FD74A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9BD9AE-46FC-4609-8D99-A3CFE91D58D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDCFF34-6F1D-45A1-BE37-6A0E17B04801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "47811209-5CE5-4375-8391-B0A7F6A0E420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C80DB2-4A78-4EC9-B2A8-1E4D902C4834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "983533DD-3970-4A37-9A9C-582BD48AA1E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "37CE1DC7-72C5-483C-8921-0B462C8284D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F66BE726-A258-42D7-B23A-925F50FDF449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58A2A898-C4C2-4670-8A0D-274F7CE6E460",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6897676D-53F9-45B3-B27F-7FF9A4C58D33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28F226A-CBC7-4A32-BE58-398FA5B42481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09ACF2D-D83F-4A86-8185-9569605D8EE1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC10D919-57FD-4725-B8D2-39ECB476902F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "48C2E003-A71C-4D06-B8B3-F93160568182",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3921C1CF-A16D-4727-99AD-03EFFA7C91CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC6DD887-9744-43EA-8B3C-44C6B6339590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide \"...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver.\" Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo vfs_fruit de Samba usa atributos de archivo extendidos (EA, xattr) para proporcionar \"...compatibilidad mejorada con los clientes SMB de Apple e interoperabilidad con un servidor de archivos AFP de Netatalk 3\". Samba versiones anteriores a 4.13.17, 4.14.12 y 4.15.5 con vfs_fruit configurado permiten una lectura y escritura fuera de l\u00edmites de la pila por medio de atributos de archivo extendidos especialmente dise\u00f1ados. Un atacante remoto con acceso de escritura a los atributos de archivo extendidos puede ejecutar c\u00f3digo arbitrario con los privilegios de smbd, t\u00edpicamente root"
    }
  ],
  "id": "CVE-2021-44142",
  "lastModified": "2025-04-23T19:15:51.880",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-02-21T15:15:07.380",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14914"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://kb.cert.org/vuls/id/119678"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.samba.org/samba/security/CVE-2021-44142.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14914"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://kb.cert.org/vuls/id/119678"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.kb.cert.org/vuls/id/119678"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.samba.org/samba/security/CVE-2021-44142.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.zerodayinitiative.com/blog/2022/2/1/cve-2021-44142-details-on-a-samba-code-execution-bug-demonstrated-at-pwn2own-austin"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        },
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        },
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-12-29 22:59
Modified
2025-04-12 10:46
Summary
The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3433Third Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlThird Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/79729Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1034493Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2855-1Third Party Advisory
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2855-2Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1276126Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://git.samba.org/?p=samba.git%3Ba=commit%3Bh=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/201612-47Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2015-5299.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3433Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/79729Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1034493Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2855-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2855-2Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1276126Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201612-47Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2015-5299.htmlVendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E18908F-2D8B-43EF-864A-8E166F519A20",
              "versionEndExcluding": "4.1.22",
              "versionStartIncluding": "3.0.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEE374EB-8CEF-4E2E-B323-22397E34BD4A",
              "versionEndExcluding": "4.2.7",
              "versionStartIncluding": "4.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6683E050-3788-41B4-BA5D-32ACDFE79648",
              "versionEndExcluding": "4.3.3",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The shadow_copy2_get_shadow_copy_data function in modules/vfs_shadow_copy2.c in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not verify that the DIRECTORY_LIST access right has been granted, which allows remote attackers to access snapshots by visiting a shadow copy directory."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n shadow_copy2_get_shadow_copy_data en modules/vfs_shadow_copy2.c en Samba 3.x y 4.x en versiones anteriores a 4.1.22, 4.2.x en versiones anteriores a 4.2.7 y 4.3.x en versiones anteriores a 4.3.3 no verifica que el privilegio de acceso al DIRECTORY_LIST ha sido concedido, lo que permite a atacantes remotos acceder a instant\u00e1neas visitando un directorio shadow copy."
    }
  ],
  "id": "CVE-2015-5299",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2015-12-29T22:59:03.217",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3433"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/79729"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1034493"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2855-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2855-2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276126"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2015-5299.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174076.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2015-December/174391.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-01/msg00017.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3433"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/79729"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1034493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2855-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2855-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1276126"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=675fd8d771f9d43e354dba53ddd9b5483ae0a1d7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05115993"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2015-5299.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-16 15:15
Modified
2024-11-21 05:18
Summary
Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "198A83C3-597D-4B9B-B737-3720E1F84492",
              "versionEndExcluding": "4.13.14",
              "versionStartIncluding": "4.13.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BD5F53-14DC-4BBF-8E5D-A1DBD24B5F02",
              "versionEndExcluding": "4.14.10",
              "versionStartIncluding": "4.14.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F33C9B3-33EE-431B-93CF-B738D05BBD0A",
              "versionEndExcluding": "4.15.2",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Kerberos acceptors need easy access to stable AD identifiers (eg objectSid). Samba as an AD DC now provides a way for Linux applications to obtain a reliable SID (and samAccountName) in issued tickets."
    },
    {
      "lang": "es",
      "value": "Los aceptadores de Kerberos necesitan un acceso f\u00e1cil a los identificadores estables de AD (por ejemplo, objectSid). Samba como un DC AD ahora proporciona una manera para que las aplicaciones de Linux para obtener un SID confiable (y samAccountName) en los boletos emitidos"
    }
  ],
  "id": "CVE-2020-25721",
  "lastModified": "2024-11-21T05:18:34.417",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-16T15:15:09.813",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021728"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14725"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-25721.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2021728"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-25721.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-01-17 21:55
Modified
2025-04-11 00:51
Severity ?
Summary
Samba 4.0.x before 4.0.1, in certain Active Directory domain-controller configurations, does not properly interpret Access Control Entries that are based on an objectClass, which allows remote authenticated users to bypass intended restrictions on modifying LDAP directory objects by leveraging (1) objectClass access by a user, (2) objectClass access by a group, or (3) write access to an attribute.
Impacted products
Vendor Product Version
samba samba 4.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 4.0.x before 4.0.1, in certain Active Directory domain-controller configurations, does not properly interpret Access Control Entries that are based on an objectClass, which allows remote authenticated users to bypass intended restrictions on modifying LDAP directory objects by leveraging (1) objectClass access by a user, (2) objectClass access by a group, or (3) write access to an attribute."
    },
    {
      "lang": "es",
      "value": "Samba v4.0.x antes de v4.0.1, en ??algunas configuraciones de Active Directory del controlador de dominio, no interpreta correctamente las entradas de control de acceso que se basan en una clase de objeto, lo que permite a usuarios remotos autenticados eludir las restricciones a la modificaci\u00f3n de objetos LDAP aprovech\u00e1ndose de (1) un acceso objectClass de un usuario, (2) un acceso objectClass de un grupo, o (3) el acceso de escritura a un atributo."
    }
  ],
  "id": "CVE-2013-0172",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-01-17T21:55:00.947",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-0172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2013-0172"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-20 15:15
Modified
2024-11-21 08:07
Summary
An infinite loop vulnerability was found in Samba's mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition.
References
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:6667Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7139Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2024:0423
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2024:0580
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2024:4101
secalert@redhat.comhttps://access.redhat.com/security/cve/CVE-2023-34966Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=2222793Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2023-34966Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:6667Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7139Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2024:0423
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2024:0580
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2024:4101
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/CVE-2023-34966Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2222793Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20230731-0010/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5477
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2023-34966Vendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7744EB5C-BA2E-4B42-9C28-DD0D4C234C3B",
              "versionEndExcluding": "4.16.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A197EF-100E-4683-AA59-E0855CBCE38B",
              "versionEndExcluding": "4.17.10",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55333C2A-E0E6-40A7-B655-93F05D6745AD",
              "versionEndExcluding": "4.18.5",
              "versionStartIncluding": "4.18.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An infinite loop vulnerability was found in Samba\u0027s mdssvc RPC service for Spotlight. When parsing Spotlight mdssvc RPC packets sent by the client, the core unmarshalling function sl_unpack_loop() did not validate a field in the network packet that contains the count of elements in an array-like structure. By passing 0 as the count value, the attacked function will run in an endless loop consuming 100% CPU. This flaw allows an attacker to issue a malformed RPC request, triggering an infinite loop, resulting in a denial of service condition."
    }
  ],
  "id": "CVE-2023-34966",
  "lastModified": "2024-11-21T08:07:44.103",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-20T15:15:11.333",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6667"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:7139"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:0423"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:0580"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:4101"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-34966"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222793"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-34966"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:7139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:0423"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:0580"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:4101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-34966"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222793"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20230731-0010/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2023/dsa-5477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-34966"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-835"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-835"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-18 18:15
Modified
2024-11-21 05:18
Summary
A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
debian debian_linux 9.0
debian debian_linux 10.0
fedoraproject fedora 33
fedoraproject fedora 34
fedoraproject fedora 35
redhat codeready_linux_builder -
redhat gluster_storage 3.0
redhat gluster_storage 3.5
redhat openstack 13
redhat openstack 16.1
redhat openstack 16.2
redhat virtualization 4.0
redhat virtualization_host 4.0
redhat enterprise_linux 7.0
redhat enterprise_linux 8.0
redhat enterprise_linux_desktop 7.0
redhat enterprise_linux_eus 8.2
redhat enterprise_linux_eus 8.4
redhat enterprise_linux_for_ibm_z_systems 7.0
redhat enterprise_linux_for_ibm_z_systems 8.0
redhat enterprise_linux_for_ibm_z_systems_eus 8.2
redhat enterprise_linux_for_ibm_z_systems_eus 8.4
redhat enterprise_linux_for_power_big_endian 7.0
redhat enterprise_linux_for_power_little_endian 7.0
redhat enterprise_linux_for_power_little_endian 8.0
redhat enterprise_linux_for_power_little_endian_eus 8.2
redhat enterprise_linux_for_power_little_endian_eus 8.4
redhat enterprise_linux_for_scientific_computing 7.0
redhat enterprise_linux_resilient_storage 7.0
redhat enterprise_linux_server 7.0
redhat enterprise_linux_server_aus 8.2
redhat enterprise_linux_server_aus 8.4
redhat enterprise_linux_server_tus 8.4
redhat enterprise_linux_server_update_services_for_sap_solutions 8.2
redhat enterprise_linux_server_update_services_for_sap_solutions 8.4
redhat enterprise_linux_tus 8.2
redhat enterprise_linux_workstation 7.0
canonical ubuntu_linux 18.04
canonical ubuntu_linux 20.04
canonical ubuntu_linux 21.04
canonical ubuntu_linux 21.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA32EB89-D016-4181-94A6-66872DF23385",
              "versionEndExcluding": "4.13.14",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2BD5F53-14DC-4BBF-8E5D-A1DBD24B5F02",
              "versionEndExcluding": "4.14.10",
              "versionStartIncluding": "4.14.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F33C9B3-33EE-431B-93CF-B738D05BBD0A",
              "versionEndExcluding": "4.15.2",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CD81C46-328B-412D-AF4E-68A2AD2F1A73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:gluster_storage:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1986832-44C9-491E-A75D-AAD8FAE683E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:gluster_storage:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "135265D8-583D-41EB-B741-419FC871CE91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*",
              "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openstack:16.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9D3F4FF-AD3D-4D17-93E8-84CAFCED2F59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openstack:16.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "307846C3-F2B3-4E0D-AA31-BCC1444589F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BBD7A51-0590-4DDF-8249-5AFA8D645CB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB28F9AF-3D06-4532-B397-96D7E4792503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "831F0F47-3565-4763-B16F-C87B1FF2035E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E3F09B5-569F-4C58-9FCA-3C0953D107B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "566507B6-AC95-47F7-A3FB-C6F414E45F51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C21FE1-EA5C-498F-9C6C-D05F91A88217",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AB105EC-19F9-424A-86F1-305A6FD74A9C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C9BD9AE-46FC-4609-8D99-A3CFE91D58D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDCFF34-6F1D-45A1-BE37-6A0E17B04801",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A684C7-88FD-43C4-9BDB-AE337FCBD0AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "47811209-5CE5-4375-8391-B0A7F6A0E420",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C80DB2-4A78-4EC9-B2A8-1E4D902C4834",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "983533DD-3970-4A37-9A9C-582BD48AA1E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "37CE1DC7-72C5-483C-8921-0B462C8284D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_resilient_storage:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F66BE726-A258-42D7-B23A-925F50FDF449",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6897676D-53F9-45B3-B27F-7FF9A4C58D33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E28F226A-CBC7-4A32-BE58-398FA5B42481",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC10D919-57FD-4725-B8D2-39ECB476902F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3921C1CF-A16D-4727-99AD-03EFFA7C91CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC6DD887-9744-43EA-8B3C-44C6B6339590",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C24797C-0397-4D4F-ADC3-3B99095DBB35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EF1C1CC-3FAE-4DE3-BC41-E5B14D5721F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:21.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAE4D2D0-CEEB-416F-8BC5-A7987DF56190",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in the way Samba maps domain users to local users. An authenticated attacker could use this flaw to cause possible privilege escalation."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo en la forma en que Samba mapea usuarios del dominio a usuarios locales. Un atacante autenticado podr\u00eda usar este fallo para causar una posible escalada de privilegios"
    }
  ],
  "id": "CVE-2020-25717",
  "lastModified": "2024-11-21T05:18:33.760",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 8.5,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-18T18:15:08.393",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-25717.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019672"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-25717.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-21 18:15
Modified
2025-01-14 19:29
Summary
All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with "log level = 3" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless).
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.htmlThird Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2021/05/msg00023.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/
secalert@redhat.comhttps://security.gentoo.org/glsa/202003-52Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20200122-0001/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/4244-1/Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2019-14907.htmlVendor Advisory
secalert@redhat.comhttps://www.synology.com/security/advisory/Synology_SA_20_01Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/05/msg00023.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202003-52Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200122-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4244-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2019-14907.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/security/advisory/Synology_SA_20_01Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "90EC6BC6-BE25-4A68-852D-B58BCA1A6624",
              "versionEndExcluding": "4.9.18",
              "versionStartIncluding": "4.9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7487A1D-2694-41FC-895C-4679A6595EBE",
              "versionEndExcluding": "4.10.12",
              "versionStartIncluding": "4.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B316BA8C-6822-49AA-8198-52E779B717DF",
              "versionEndExcluding": "4.11.5",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "379A5883-F6DF-41F5-9403-8D17F6605737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:synology:directory_server:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83512426-0B96-43E2-AFBA-592B25E61676",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:synology:router_manager:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F6D2BF-23EA-4D44-8126-64EA85184D38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:synology:skynas:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C997777-BE79-4F77-90D7-E1A71D474D88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:synology:diskstation_manager:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9685B12-824F-42AD-B87C-6E7A78BB7FA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "All samba versions 4.9.x before 4.9.18, 4.10.x before 4.10.12 and 4.11.x before 4.11.5 have an issue where if it is set with \"log level = 3\" (or above) then the string obtained from the client, after a failed character conversion, is printed. Such strings can be provided during the NTLMSSP authentication exchange. In the Samba AD DC in particular, this may cause a long-lived process(such as the RPC server) to terminate. (In the file server case, the most likely target, smbd, operates as process-per-client and so a crash there is harmless)."
    },
    {
      "lang": "es",
      "value": "Todas las versiones de samba 4.9.x anteriores a 4.9.18, 4.10.x anteriores a 4.10.12 y 4.11.x anteriores a 4.11.5, presentan un problema donde si se configura con \"log level = 3\" (o superior), la cadena obtenida desde el cliente, luego de una conversi\u00f3n de caracteres fallida, es impresa. Tales cadenas pueden ser proporcionadas durante el intercambio de autenticaci\u00f3n NTLMSSP. En particular, en el AD DC de Samba esto puede causar que un proceso de larga duraci\u00f3n (tal y como el servidor RPC) finalice. (En el caso del servidor de archivos, el objetivo m\u00e1s probable, smbd, opera como un proceso por cliente, por lo que un bloqueo all\u00ed es inofensivo)."
    }
  ],
  "id": "CVE-2019-14907",
  "lastModified": "2025-01-14T19:29:55.853",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-21T18:15:12.717",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200122-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4244-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14907.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_20_01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14907"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200122-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4244-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14907.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_20_01"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-03-06 23:15
Modified
2025-03-06 21:15
Summary
Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96).
Impacted products
Vendor Product Version
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "703773B3-EE5B-41F5-A2D9-B56F96B8793D",
              "versionEndExcluding": "4.15.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10AA6759-95FC-47A6-AA92-342893A2B23E",
              "versionEndExcluding": "4.16.8",
              "versionStartIncluding": "4.16.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Since the Windows Kerberos RC4-HMAC Elevation of Privilege Vulnerability was disclosed by Microsoft on Nov 8 2022 and per RFC8429 it is assumed that rc4-hmac is weak, Vulnerable Samba Active Directory DCs will issue rc4-hmac encrypted tickets despite the target server supporting better encryption (eg aes256-cts-hmac-sha1-96)."
    },
    {
      "lang": "es",
      "value": "Dado que la vulnerabilidad de elevaci\u00f3n de privilegios de Windows Kerberos RC4-HMAC fue revelada por Microsoft el 8 de noviembre de 2022 y seg\u00fan RFC8429 se asume que rc4-hmac es d\u00e9bil, los DC de Directorio Activo Samba vulnerables emitir\u00e1n tickets cifrados rc4-hmac a pesar de que el servidor de destino admita un cifrado mejor (por ejemplo, aes256-cts-hmac-sha1-96)."
    }
  ],
  "id": "CVE-2022-45141",
  "lastModified": "2025-03-06T21:15:12.980",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-03-06T23:15:11.157",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-45141.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-45141.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-328"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-326"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-326"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-01-10 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
References
cve@mitre.orgftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
cve@mitre.orghttp://secunia.com/advisories/13453/
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1
cve@mitre.orghttp://www.debian.org/security/2005/dsa-701
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=165&type=vulnerabilities
cve@mitre.orghttp://www.kb.cert.org/vuls/id/226184Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2004_45_samba.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2005-020.html
cve@mitre.orghttp://www.samba.org/samba/security/CAN-2004-1154.html
cve@mitre.orghttp://www.securityfocus.com/bid/11973
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18519
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13453/
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-701
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=165&type=vulnerabilities
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/226184Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2004_45_samba.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2005-020.html
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CAN-2004-1154.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/11973
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18519
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642
Impacted products
Vendor Product Version
samba samba 2.0.0
samba samba 2.0.1
samba samba 2.0.2
samba samba 2.0.3
samba samba 2.0.4
samba samba 2.0.5
samba samba 2.0.6
samba samba 2.0.7
samba samba 2.0.8
samba samba 2.0.9
samba samba 2.0.10
samba samba 2.2.0
samba samba 2.2.0a
samba samba 2.2.1a
samba samba 2.2.2
samba samba 2.2.3
samba samba 2.2.3a
samba samba 2.2.4
samba samba 2.2.5
samba samba 2.2.6
samba samba 2.2.7
samba samba 2.2.7a
samba samba 2.2.8
samba samba 2.2.8a
samba samba 2.2.9
samba samba 2.2.11
samba samba 2.2.12
samba samba 2.2a
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
redhat fedora_core core_2.0
redhat fedora_core core_3.0
suse suse_linux 1.0
suse suse_linux 8.1
suse suse_linux 8.2
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.0
suse suse_linux 9.1
suse suse_linux 9.2
trustix secure_linux 2.0
trustix secure_linux 2.1
trustix secure_linux 2.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F681E4CC-B8D3-48A2-B93E-0363B22B059E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D03B96-8FF3-4FC6-BC38-288F3ADBA9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF2248C-5A71-49FC-88F4-2D1F376155FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FD10B2-ED2D-4F55-8F0E-77429C8A716E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F15704-2F2B-4536-A2A0-510B5CE91D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "93AF43FA-9947-4F26-96E8-1D77BF909AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A46D8D-1535-400B-B1CD-AA2685F4164D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CB46ABA-F403-4715-915D-870BD221C8FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD51F01-B47A-47F5-8798-2EB53EB17297",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C127A2E6-F94F-41D5-82AA-60C0190186BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "61291A4C-28A3-433B-80D2-005976851882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65AC9643-E1A5-4013-9607-17C6CC7CC63B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "090E2541-2DBA-41CB-A792-9E703C797949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F65FF3-71F8-4278-A823-A6E0FF65D9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C71CB60-2689-4A4A-9509-E2F3135E6491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0129E404-3AE8-4F0E-89CB-7F2FA5B47011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "614547F5-9C3F-489B-9B72-91B0FF646CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A052141C-874D-4ED0-99FB-D7468FACFC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9739EA65-9FA8-425E-B355-E690773D5B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B618F94-DAC2-4A97-9F7F-8BCEA3199769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE7C057-B024-4417-B572-5D396366620E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DC3500-F8F0-46E1-B0AA-C2474CCB3DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFCD334C-FB95-41A6-8F4C-FCC4E70CE930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "75C86202-3150-440C-B048-BB039E9D3606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CAF474-0C3A-4E49-8CF8-9DF14D84CDCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92304DE-CFBB-4C03-AA7F-54DB3C14ECF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "04F39AA5-9048-4EE9-B0F2-CE679C673F0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC2AE5A9-62C5-4DCE-85B3-16F48695B3B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6996B14-925B-46B8-982F-3545328B506B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC80CF67-C51D-442C-9526-CFEDE84A6304",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:1.0:*:desktop:*:*:*:*:*",
              "matchCriteriaId": "C7EAAD04-D7C4-43DE-B488-1AAD014B503E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8C55338-3372-413F-82E3-E1B476D6F41A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:enterprise_server:*:*:*:*:*",
              "matchCriteriaId": "F7446746-87B7-4BD3-AABF-1E0FAA8265AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
              "matchCriteriaId": "56EF103F-5668-4754-A83B-D3662D0CE815",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFABFCE5-4F86-4AE8-9849-BC360AC72098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "53AF1A2D-B0A2-4097-AD1D-DF3AF27171BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A67735E5-E43E-4164-BDB2-ADC6E0288E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AB70F82-52BB-4D0D-9A24-9AF67278466D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow."
    }
  ],
  "id": "CVE-2004-1154",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-01-10T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/13453/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-701"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.idefense.com/application/poi/display?id=165\u0026type=vulnerabilities"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/226184"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2004_45_samba.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-020.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.samba.org/samba/security/CAN-2004-1154.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/11973"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18519"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.17/SCOSA-2005.17.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2005/Mar/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/13453/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101643-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57730-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-701"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.idefense.com/application/poi/display?id=165\u0026type=vulnerabilities"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/226184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2004_45_samba.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2005-020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/security/CAN-2004-1154.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/11973"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18519"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10236"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A642"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-20 15:15
Modified
2024-12-06 11:15
Summary
A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path.
References
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:6667Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7139Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2024:0423
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2024:0580
secalert@redhat.comhttps://access.redhat.com/security/cve/CVE-2023-34968Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=2222795Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2023-34968.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:6667Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7139Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2024:0423
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2024:0580
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/CVE-2023-34968Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2222795Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20230731-0010/
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2023/dsa-5477
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2023-34968.htmlVendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7744EB5C-BA2E-4B42-9C28-DD0D4C234C3B",
              "versionEndExcluding": "4.16.11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A197EF-100E-4683-AA59-E0855CBCE38B",
              "versionEndExcluding": "4.17.10",
              "versionStartIncluding": "4.17.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55333C2A-E0E6-40A7-B655-93F05D6745AD",
              "versionEndExcluding": "4.18.5",
              "versionStartIncluding": "4.18.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "379A5883-F6DF-41F5-9403-8D17F6605737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A path disclosure vulnerability was found in Samba. As part of the Spotlight protocol, Samba discloses the server-side absolute path of shares, files, and directories in the results for search queries. This flaw allows a malicious client or an attacker with a targeted RPC request to view the information that is part of the disclosed path."
    }
  ],
  "id": "CVE-2023-34968",
  "lastModified": "2024-12-06T11:15:05.270",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-20T15:15:11.540",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6667"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:7139"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:0423"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:0580"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-34968"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222795"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-34968.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6667"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:7139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:0423"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:0580"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-34968"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222795"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20230731-0010/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.debian.org/security/2023/dsa-5477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-34968.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-201"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-03 13:15
Modified
2024-11-21 08:18
Summary
A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes.
References
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:6209Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:6744Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7371
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7408
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7464
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2023:7467
secalert@redhat.comhttps://access.redhat.com/security/cve/CVE-2023-3961Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=2241881Issue Tracking
secalert@redhat.comhttps://bugzilla.samba.org/show_bug.cgi?id=15422Exploit, Issue Tracking
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2023-3961.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:6209Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:6744Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7371
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7408
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7464
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2023:7467
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/cve/CVE-2023-3961Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=2241881Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=15422Exploit, Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20231124-0002/
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2023-3961.htmlVendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C9913F9-D46D-4CE3-AA78-E50D32779971",
              "versionEndExcluding": "4.17.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A33312F-1523-4647-83DA-6DD6231906F9",
              "versionEndExcluding": "4.18.8",
              "versionStartIncluding": "4.18.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE496104-DDB5-4709-8026-C83E99B0C865",
              "versionEndExcluding": "4.19.1",
              "versionStartIncluding": "4.19.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:storage:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "379A5883-F6DF-41F5-9403-8D17F6605737",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DDA3E5A-8754-4C48-9A27-E2415F8A6000",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A path traversal vulnerability was identified in Samba when processing client pipe names connecting to Unix domain sockets within a private directory. Samba typically uses this mechanism to connect SMB clients to remote procedure call (RPC) services like SAMR LSA or SPOOLSS, which Samba initiates on demand. However, due to inadequate sanitization of incoming client pipe names, allowing a client to send a pipe name containing Unix directory traversal characters (../). This could result in SMB clients connecting as root to Unix domain sockets outside the private directory. If an attacker or client managed to send a pipe name resolving to an external service using an existing Unix domain socket, it could potentially lead to unauthorized access to the service and consequential adverse events, including compromise or service crashes."
    },
    {
      "lang": "es",
      "value": "Se identific\u00f3 una vulnerabilidad de path traversal en Samba al procesar nombres de canalizaciones de clientes que se conectan a sockets de dominio Unix dentro de un directorio privado. Samba normalmente usa este mecanismo para conectar clientes SMB a servicios de Remote Procedure Call (RPC) como SAMR LSA o SPOOLSS, que Samba inicia bajo demanda. Sin embargo, debido a una sanitizaci\u00f3n inadecuada de los nombres de canalizaci\u00f3n del cliente entrante, se permite que un cliente env\u00ede un nombre de canalizaci\u00f3n que contenga caracteres transversales del directorio Unix (../). Esto podr\u00eda provocar que los clientes SMB se conecten como root a sockets de dominio Unix fuera del directorio privado. Si un atacante o cliente lograra enviar un nombre de canalizaci\u00f3n a un servicio externo utilizando un socket de dominio Unix existente, podr\u00eda provocar un acceso no autorizado al servicio y los consiguientes eventos adversos, incluido el compromiso o la ca\u00edda del servicio."
    }
  ],
  "id": "CVE-2023-3961",
  "lastModified": "2024-11-21T08:18:24.390",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-03T13:15:08.723",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6209"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6744"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2023:7371"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2023:7408"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2023:7464"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2023:7467"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-3961"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241881"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=15422"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-3961.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6209"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2023:6744"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2023:7371"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2023:7408"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2023:7464"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2023:7467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-3961"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241881"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=15422"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20231124-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-3961.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-04-25 00:59
Modified
2025-04-12 10:46
Summary
The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the "server signing = mandatory" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream.
References
secalert@redhat.comhttp://badlock.org/
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0612.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0614.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0618.html
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0620.html
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3548
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
secalert@redhat.comhttp://www.securityfocus.com/bid/86011
secalert@redhat.comhttp://www.securitytracker.com/id/1035533
secalert@redhat.comhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-1
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-2
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-3
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-4
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-5
secalert@redhat.comhttps://bto.bluecoat.com/security-advisory/sa122
secalert@redhat.comhttps://security.gentoo.org/glsa/201612-47
secalert@redhat.comhttps://www.samba.org/samba/history/samba-4.2.10.html
secalert@redhat.comhttps://www.samba.org/samba/latest_news.html#4.4.2
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2016-2114.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://badlock.org/
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0612.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0614.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0618.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0620.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3548
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/86011
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035533
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-1
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-2
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-3
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-4
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-5
af854a3a-2127-422b-91ae-364da2661108https://bto.bluecoat.com/security-advisory/sa122
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201612-47
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/history/samba-4.2.10.html
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/latest_news.html#4.4.2
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2016-2114.htmlPatch, Vendor Advisory
Impacted products
Vendor Product Version
samba samba 4.0.0
samba samba 4.0.1
samba samba 4.0.2
samba samba 4.0.3
samba samba 4.0.4
samba samba 4.0.5
samba samba 4.0.6
samba samba 4.0.7
samba samba 4.0.8
samba samba 4.0.9
samba samba 4.0.10
samba samba 4.0.11
samba samba 4.0.12
samba samba 4.0.13
samba samba 4.0.14
samba samba 4.0.15
samba samba 4.0.16
samba samba 4.0.17
samba samba 4.0.18
samba samba 4.0.19
samba samba 4.0.20
samba samba 4.0.21
samba samba 4.0.22
samba samba 4.0.23
samba samba 4.0.24
samba samba 4.0.25
samba samba 4.0.26
samba samba 4.1.0
samba samba 4.1.1
samba samba 4.1.2
samba samba 4.1.3
samba samba 4.1.4
samba samba 4.1.5
samba samba 4.1.6
samba samba 4.1.7
samba samba 4.1.8
samba samba 4.1.9
samba samba 4.1.10
samba samba 4.1.11
samba samba 4.1.12
samba samba 4.1.13
samba samba 4.1.14
samba samba 4.1.15
samba samba 4.1.16
samba samba 4.1.17
samba samba 4.1.18
samba samba 4.1.19
samba samba 4.1.20
samba samba 4.1.21
samba samba 4.1.22
samba samba 4.1.23
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.0
samba samba 4.2.1
samba samba 4.2.2
samba samba 4.2.3
samba samba 4.2.4
samba samba 4.2.5
samba samba 4.2.6
samba samba 4.2.7
samba samba 4.2.8
samba samba 4.2.9
samba samba 4.3.0
samba samba 4.3.1
samba samba 4.3.2
samba samba 4.3.3
samba samba 4.3.4
samba samba 4.3.5
samba samba 4.3.6
samba samba 4.4.0
canonical ubuntu_linux 14.04
canonical ubuntu_linux 15.10
canonical ubuntu_linux 16.04



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEEFFF7-DF7C-4641-81A9-1CD64DC29DEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2855B3F6-49B6-4D25-BEAC-4D1797D1E100",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C1F1993-70A2-4104-85AF-3BECB330AB24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E955458C-8F5C-4D55-9F78-9E1CB4416F10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "866FF7AC-19EA-49E7-B423-9FF57839B580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A1A64C7-B039-4724-B06C-EAC898EB3B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C572E25A-4B44-426D-B637-292A08766D7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D96D806-ED52-4010-9F5F-F84E33C245D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "643FC7D2-FC39-43FA-99E6-805553FE1DCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2B95519-0C9D-473C-912D-E350106DC4CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC603E1A-7882-45F0-9E8D-157F191C0FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F9321C-B442-4081-8E4A-62BAD95239A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "012A397B-004D-489C-B06D-C0D67E26B1CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "392E0C61-7718-4DBC-8F02-6F3C2CBE1783",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "D893CD1C-31D7-4F7F-BD0B-BEF75DCB2DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "324AE9D7-C41F-493E-A1AD-FCD869D29D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "68519B1F-F315-4BBD-A4A3-4E1956D81E85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF745E93-A92E-4AD7-8D42-36E9387C6915",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E4B760-417E-45D1-9CE1-AEBC8936BDA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0DA221-078A-49DC-B0F1-F318FD785664",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72BCA7B-6338-4A7C-AE71-E0B8F6C9F2F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD8F6AB9-A6C4-443E-A846-EE845BE24F74",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C8F7D7-BAAD-4F3A-BA39-44BE0CCADFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC522377-A6CD-4513-83B4-9ADC15F76B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC4595-5699-4237-BCD7-FD233BA1AECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EFCC9DB-4AA9-460E-87F0-1F74DEBB104B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "15FAC8F1-CB72-4DBD-9746-372246BEFEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CB9C10B-284E-48CD-A524-1A6BF828AED9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F70DD815-1DAA-4025-8C97-32C7D06D8AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A37DA6E-6EB7-429B-ACE0-2B1220BD62C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA25E8C-9EFA-4A01-A2F0-CD63A39EDD08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "41C33F47-0F28-4AE2-A895-82B5E0F4496D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6EEFF35-E903-4651-A4B4-D92FF26A7509",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44BD172-80FA-4260-BAFB-251A95E8C7B4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F09116D2-F168-4305-9A1D-88A1D42739A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "558E0B71-F79E-47B5-90CC-9C165BB15507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8D7E102-DD54-43F2-B008-66F7C243477E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8066AB8C-1AE6-4DA3-91DB-4BF67DBBA279",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A03CB9E-DEFC-4507-A314-5E0824A66462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6708D6E-2098-432D-820A-853032BD9A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "42BA346B-F7C6-4EB3-91BD-2CCC2B688AB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B689AA-2074-4E9A-93BD-F910510A29AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EF22E49-B259-4E13-B371-0C0173E534FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE5C0A8F-A502-4BC1-AC8A-45AE1D16371D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73876B7-A758-40CB-919D-6720AA7B9564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "84925F68-F440-4677-B3DF-F87EAC39E235",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC0A0B3C-C011-4F27-BE8D-5A89BFC93F80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7792A65-DB6E-49F4-9447-021EA9A82697",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF3B982-B094-4B54-84A2-4CA199EE4E8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6811F5-DDCA-4AED-9BF9-4C71550A727D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.1.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF1670DE-C3B6-4EA3-8132-66BBD4CEFAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "AE10A1EF-F9CE-4126-9793-FB70A1D512A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "7FA4DD6C-1531-420A-B271-EB16EA05470B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "AB6AEA9D-42C8-4C60-86AE-54DB2940A3B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "2F221BF0-7B2B-4676-B8F2-2705C05B4034",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C395C0-160C-4D8A-A3B6-7E30DD8721EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B17EC5DF-2F00-479B-9775-45DA569BCED3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CC31CBA-10A4-417C-A381-2BB7A68CE0D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65D07800-4CCD-4B98-8D41-778295D1A3A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C4D3BA-781F-4C96-9234-73DB1593C7E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AACDFB6-841E-42A5-AA8D-58E8A38D11D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD43D2C5-26D5-41AC-BC20-FACB68D22F09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D186867E-18D6-4960-B8BE-A4353D941357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "23DAAAEB-EB1E-4BCD-B88E-33418E3FD1DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8643B45-1CE3-492F-BD82-65801F6C6FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F009D18-204C-4E6D-9827-9FBA9A4FFBA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "158DC9D2-2264-48B6-9116-CE6F0138D7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4339B46-E92A-4F7C-A0BA-62D7F7C428DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A3D5E50-874B-48AE-B7C0-264DA0531847",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "60C0F5A3-DB13-4BAC-B633-7E7F54FE34FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E28BFB7-FB1A-455E-BE0B-ADDEBFA9B9B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A0453F7-380D-4F29-9B54-D47AAAD9FFE6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SMB1 protocol implementation in Samba 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 does not recognize the \"server signing = mandatory\" setting, which allows man-in-the-middle attackers to spoof SMB servers by modifying the client-server data stream."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n del protocolo SMB1 en Samba 4.x en versiones anteriores a 4.2.11, 4.3.x en versiones anteriores a 4.3.8 y 4.4.x en versiones anteriores a 4.4.2 no reconoce el ajuste \"server signing = mandatory\", lo que permite a atacantes man-in-the-middle suplantar servidores SMB modificando el flujo de datos cliente-servidor."
    }
  ],
  "id": "CVE-2016-2114",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-25T00:59:05.113",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://badlock.org/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2016/dsa-3548"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/86011"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id/1035533"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-2950-5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bto.bluecoat.com/security-advisory/sa122"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2114.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://badlock.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2016/dsa-3548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/86011"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1035533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-2950-5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bto.bluecoat.com/security-advisory/sa122"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2114.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-254"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-10-12 18:15
Modified
2024-11-21 06:22
Summary
A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE0BDAA5-2AEC-40FD-A355-571DB1F7E49B",
              "versionEndExcluding": "4.13.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4749057-1B17-4E8E-A26E-0C2E2A6EA0BA",
              "versionEndExcluding": "4.14.8",
              "versionStartIncluding": "4.14.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:netapp:management_services_for_element_software:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86B51137-28D9-41F2-AFA2-3CC22B4954D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:management_services_for_netapp_hci:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4455CF3A-CC91-4BE4-A7AB-929AC82E34F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7CF3019-975D-40BB-A8A4-894E62BD3797",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A null pointer de-reference was found in the way samba kerberos server handled missing sname in TGS-REQ (Ticket Granting Server - Request). An authenticated user could use this flaw to crash the samba server."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado una desreferencia de puntero null en la forma en que el servidor kerberos de Samba manejaba el sname faltante en TGS-REQ (Ticket Granting Server - Request). Un usuario autenticado podr\u00eda usar este fallo para bloquear el servidor samba"
    }
  ],
  "id": "CVE-2021-3671",
  "lastModified": "2024-11-21T06:22:07.473",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-10-12T18:15:08.357",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080%2C"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14770%2C"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20221215-0002/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5287"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013080%2C"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=14770%2C"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/heimdal/heimdal/commit/04171147948d0a3636bc6374181926f0fb2ec83a"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20221215-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2022/dsa-5287"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-01-21 18:15
Modified
2024-11-21 04:27
Summary
There is an issue in all samba 4.11.x versions before 4.11.5, all samba 4.10.x versions before 4.10.12 and all samba 4.9.x versions before 4.9.18, where the removal of the right to create or modify a subtree would not automatically be taken away on all domain controllers.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.htmlThird Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14902Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2021/05/msg00023.htmlThird Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/
secalert@redhat.comhttps://security.gentoo.org/glsa/202003-52Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20200122-0001/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/4244-1/Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2019-14902.htmlMailing List, Vendor Advisory
secalert@redhat.comhttps://www.synology.com/security/advisory/Synology_SA_20_01Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14902Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/05/msg00023.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202003-52Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20200122-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4244-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2019-14902.htmlMailing List, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/security/advisory/Synology_SA_20_01Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25EA88C4-04ED-44AA-B714-9EFFD076DB6B",
              "versionEndExcluding": "4.9.18",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7487A1D-2694-41FC-895C-4679A6595EBE",
              "versionEndExcluding": "4.10.12",
              "versionStartIncluding": "4.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B316BA8C-6822-49AA-8198-52E779B717DF",
              "versionEndExcluding": "4.11.5",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is an issue in all samba 4.11.x versions before 4.11.5, all samba 4.10.x versions before 4.10.12 and all samba 4.9.x versions before 4.9.18, where the removal of the right to create or modify a subtree would not automatically be taken away on all domain controllers."
    },
    {
      "lang": "es",
      "value": "Se presenta un problema en todas las versiones 4.11.x anteriores a 4.11.5 de samba, todas las versiones 4.10.x anteriores a 4.10.12 de samba y todas las versiones 4.9.x anteriores a 4.9.18 de samba, donde la eliminaci\u00f3n del derecho a crear o modificar un sub-\u00e1rbol no ser\u00eda quitado autom\u00e1ticamente en todos los controladores del dominio."
    }
  ],
  "id": "CVE-2019-14902",
  "lastModified": "2024-11-21T04:27:39.143",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-01-21T18:15:12.653",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14902"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200122-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4244-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14902.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_20_01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00055.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14902"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ACZVNMIFQGGXNJPMHAVBN3H2U65FXQY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GQ6U65I2K23YJC4FESW477WL55TU3PPT/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200122-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4244-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14902.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_20_01"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-08-22 14:29
Modified
2024-11-21 03:59
Summary
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
References
secalert@redhat.comhttp://www.securityfocus.com/bid/105084Third Party Advisory, VDB Entry
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2018:2612Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2018:2613Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2018:3056Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/202003-52Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20180814-0001/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/3738-1/Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2018-1139.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/105084Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:2612Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:2613Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2018:3056Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202003-52Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20180814-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/3738-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2018-1139.htmlThird Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2D88D65-4DCC-44B4-9671-1D2C5FE598D9",
              "versionEndExcluding": "4.7.9",
              "versionStartIncluding": "4.7.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E405D2-03BC-4808-A8F1-1C4BF24CFCCA",
              "versionEndExcluding": "4.8.4",
              "versionStartIncluding": "4.8.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client."
    },
    {
      "lang": "es",
      "value": "Se ha detectado un fallo en la manera en la que samba en versiones anteriores a la 4.7.9 y 4.8.4 permit\u00eda el uso de la autenticaci\u00f3n NTLMv1 d\u00e9bil incluso cuando NTLMv1 estaba expl\u00edcitamente deshabilitado. Un atacante Man-in-the-Middle (MitM) podr\u00eda utilizar este fallo para leer la credencial y otros detalles pasados entre el servidor y cliente de samba."
    }
  ],
  "id": "CVE-2018-1139",
  "lastModified": "2024-11-21T03:59:16.187",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-08-22T14:29:00.363",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105084"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2018:2612"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2018:2613"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2018:3056"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180814-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3738-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-1139.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2018:2612"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2018:2613"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2018:3056"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180814-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3738-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-1139.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-522"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-11-27 22:29
Modified
2025-04-20 01:37
Summary
Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory.
References
cve@mitre.orghttp://www.securityfocus.com/bid/101908Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1039855Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/USN-3486-1Third Party Advisory
cve@mitre.orghttp://www.ubuntu.com/usn/USN-3486-2Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:3260Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:3261Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:3278Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2017/11/msg00029.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/201805-07Third Party Advisory
cve@mitre.orghttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_usThird Party Advisory
cve@mitre.orghttps://www.debian.org/security/2017/dsa-4043Third Party Advisory
cve@mitre.orghttps://www.samba.org/samba/security/CVE-2017-15275.htmlVendor Advisory
cve@mitre.orghttps://www.synology.com/support/security/Synology_SA_17_72_SambaThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/101908Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1039855Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3486-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-3486-2Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:3260Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:3261Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:3278Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2017/11/msg00029.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201805-07Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03817en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2017/dsa-4043Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2017-15275.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/support/security/Synology_SA_17_72_SambaThird Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B2811F-CB85-4C6D-A72A-62777E22098B",
              "versionEndExcluding": "4.5.15",
              "versionStartIncluding": "3.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ECEC5E5-52C3-4772-BB7D-62294F59BF76",
              "versionEndExcluding": "4.6.11",
              "versionStartIncluding": "4.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FA896BE-8FFF-4C6F-ABD3-EC1720A80DFE",
              "versionEndExcluding": "4.7.3",
              "versionStartIncluding": "4.7.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "588D4F37-0A56-47A4-B710-4D5F3D214FB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba before 4.7.3 might allow remote attackers to obtain sensitive information by leveraging failure of the server to clear allocated heap memory."
    },
    {
      "lang": "es",
      "value": "Las versiones anteriores a la 4.7.3 de Samba podr\u00edan permitir que atacantes remotos obtengan informaci\u00f3n sensible aprovechando el error del servidor para borrar la memoria din\u00e1mica (heap) asignada."
    }
  ],
  "id": "CVE-2017-15275",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-11-27T22:29:00.410",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/101908"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1039855"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-3486-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-3486-2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3260"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3261"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3278"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-07"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2017/dsa-4043"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2017-15275.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/101908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1039855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-3486-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-3486-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3260"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3261"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:3278"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2017/11/msg00029.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-07"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03817en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2017/dsa-4043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2017-15275.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/support/security/Synology_SA_17_72_Samba"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-11-16 18:46
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request.
References
PSIRT-CNA@flexerasoftware.comhttp://docs.info.apple.com/article.html?artnum=307179
PSIRT-CNA@flexerasoftware.comhttp://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
PSIRT-CNA@flexerasoftware.comhttp://lists.vmware.com/pipermail/security-announce/2008/000002.html
PSIRT-CNA@flexerasoftware.comhttp://marc.info/?l=bugtraq&m=120524782005154&w=2
PSIRT-CNA@flexerasoftware.comhttp://marc.info/?l=bugtraq&m=120524782005154&w=2
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27450Vendor Advisory
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27679
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27682
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27691
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27701
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27720
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27731
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27742
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27787
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/27927
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28136
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/28368
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/29341
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/30484
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/advisories/30835
PSIRT-CNA@flexerasoftware.comhttp://secunia.com/secunia_research/2007-90/advisory/
PSIRT-CNA@flexerasoftware.comhttp://securityreason.com/securityalert/3372
PSIRT-CNA@flexerasoftware.comhttp://securitytracker.com/id?1018953
PSIRT-CNA@flexerasoftware.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.447739
PSIRT-CNA@flexerasoftware.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1
PSIRT-CNA@flexerasoftware.comhttp://us1.samba.org/samba/security/CVE-2007-5398.html
PSIRT-CNA@flexerasoftware.comhttp://www.debian.org/security/2007/dsa-1409
PSIRT-CNA@flexerasoftware.comhttp://www.gentoo.org/security/en/glsa/glsa-200711-29.xml
PSIRT-CNA@flexerasoftware.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:224
PSIRT-CNA@flexerasoftware.comhttp://www.novell.com/linux/security/advisories/2007_65_samba.html
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1013.html
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1016.html
PSIRT-CNA@flexerasoftware.comhttp://www.redhat.com/support/errata/RHSA-2007-1017.html
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/archive/1/483744/100/0/threaded
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/archive/1/485936/100/0/threaded
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/archive/1/486859/100/0/threaded
PSIRT-CNA@flexerasoftware.comhttp://www.securityfocus.com/bid/26455
PSIRT-CNA@flexerasoftware.comhttp://www.us-cert.gov/cas/techalerts/TA07-352A.htmlUS Government Resource
PSIRT-CNA@flexerasoftware.comhttp://www.vmware.com/security/advisories/VMSA-2008-0001.html
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2007/3869
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2007/4238
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/0064
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/0859/references
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/1712/references
PSIRT-CNA@flexerasoftware.comhttp://www.vupen.com/english/advisories/2008/1908
PSIRT-CNA@flexerasoftware.comhttp://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
PSIRT-CNA@flexerasoftware.comhttp://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
PSIRT-CNA@flexerasoftware.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/38502
PSIRT-CNA@flexerasoftware.comhttps://issues.rpath.com/browse/RPL-1894
PSIRT-CNA@flexerasoftware.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10230
PSIRT-CNA@flexerasoftware.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5811
PSIRT-CNA@flexerasoftware.comhttps://usn.ubuntu.com/544-1/
PSIRT-CNA@flexerasoftware.comhttps://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=307179
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html
af854a3a-2127-422b-91ae-364da2661108http://lists.vmware.com/pipermail/security-announce/2008/000002.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=120524782005154&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=120524782005154&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27450Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27679
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27682
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27691
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27701
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27720
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27731
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27742
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27787
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27927
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28136
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/28368
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29341
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30484
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/30835
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/secunia_research/2007-90/advisory/
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3372
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1018953
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.447739
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1
af854a3a-2127-422b-91ae-364da2661108http://us1.samba.org/samba/security/CVE-2007-5398.html
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1409
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:224
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_65_samba.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1013.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1016.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1017.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/483744/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/485936/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/486859/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26455
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-352A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2008-0001.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3869
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/4238
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0064
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0859/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1712/references
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1908
af854a3a-2127-422b-91ae-364da2661108http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
af854a3a-2127-422b-91ae-364da2661108http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/38502
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1894
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10230
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5811
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/544-1/
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html
Impacted products
Vendor Product Version
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26a



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the reply_netbios_packet function in nmbd/nmbd_packets.c in nmbd in Samba 3.0.0 through 3.0.26a, when operating as a WINS server, allows remote attackers to execute arbitrary code via crafted WINS Name Registration requests followed by a WINS Name Query request."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n reply_netbios_packet en el nmbd/nmbd_packets.c del nmbd en el Samba 3.0.0 hasta el 3.0.26a, cuando opera como un servidor WINS, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de peticiones modificadas del registro de nombres WINS seguidas de una petici\u00f3n de consultas de nombre WINS."
    }
  ],
  "id": "CVE-2007-5398",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-11-16T18:46:00.000",
  "references": [
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://docs.info.apple.com/article.html?artnum=307179"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://lists.vmware.com/pipermail/security-announce/2008/000002.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27450"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27679"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27682"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27691"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27701"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27720"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27731"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27742"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27787"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/27927"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/28136"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/28368"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/29341"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/30484"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/advisories/30835"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://secunia.com/secunia_research/2007-90/advisory/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securityreason.com/securityalert/3372"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://securitytracker.com/id?1018953"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.447739"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://us1.samba.org/samba/security/CVE-2007-5398.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.debian.org/security/2007/dsa-1409"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:224"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.novell.com/linux/security/advisories/2007_65_samba.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1013.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1016.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1017.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/483744/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/485936/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/archive/1/486859/100/0/threaded"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.securityfocus.com/bid/26455"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vmware.com/security/advisories/VMSA-2008-0001.html"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2007/3869"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2007/4238"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2008/0064"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2008/0859/references"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2008/1712/references"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www.vupen.com/english/advisories/2008/1908"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38502"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://issues.rpath.com/browse/RPL-1894"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10230"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5811"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://usn.ubuntu.com/544-1/"
    },
    {
      "source": "PSIRT-CNA@flexerasoftware.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=307179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2007/Dec/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.vmware.com/pipermail/security-announce/2008/000002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=120524782005154\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27450"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27679"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27682"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27701"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27720"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27731"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27742"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27787"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27927"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28136"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/28368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29341"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30484"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/30835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/secunia_research/2007-90/advisory/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3372"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1018953"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.447739"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-237764-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://us1.samba.org/samba/security/CVE-2007-5398.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1409"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200711-29.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:224"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_65_samba.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1017.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/483744/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/485936/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/486859/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26455"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2008-0001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3869"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/4238"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0064"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0859/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1712/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www11.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c01475657"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/38502"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1894"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5811"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/544-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00472.html"
    }
  ],
  "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-10 23:15
Modified
2024-11-21 04:27
Summary
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2021/05/msg00023.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2022/11/msg00034.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/
secalert@redhat.comhttps://security.gentoo.org/glsa/202003-52Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/202310-06
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20191210-0002/Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20230216-0008/
secalert@redhat.comhttps://usn.ubuntu.com/4217-1/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/4217-2/Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2019-14870.htmlVendor Advisory
secalert@redhat.comhttps://www.synology.com/security/advisory/Synology_SA_19_40Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/05/msg00023.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2022/11/msg00034.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202003-52Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202310-06
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20191210-0002/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20230216-0008/
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4217-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4217-2/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2019-14870.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/security/advisory/Synology_SA_19_40Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C10D91-8EB3-4869-9C66-B73EF3A4F270",
              "versionEndExcluding": "4.9.17",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA37AE3F-78AA-4807-8C66-7C197045D0F8",
              "versionEndExcluding": "4.10.11",
              "versionStartIncluding": "4.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "776B9CDE-BF44-4A36-9C07-F0F71E66533D",
              "versionEndExcluding": "4.11.3",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the S4U (MS-SFU) Kerberos delegation model includes a feature allowing for a subset of clients to be opted out of constrained delegation in any way, either S4U2Self or regular Kerberos authentication, by forcing all tickets for these clients to be non-forwardable. In AD this is implemented by a user attribute delegation_not_allowed (aka not-delegated), which translates to disallow-forwardable. However the Samba AD DC does not do that for S4U2Self and does set the forwardable flag even if the impersonated client has the not-delegated flag set."
    },
    {
      "lang": "es",
      "value": "Todas las versiones de Samba 4.xx anteriores a 4.9.17, versiones 4.10.x anteriores a 4.10.11 y versiones 4.11.x anteriores a 4.11.3, presentan un problema, donde el modelo de delegaci\u00f3n de Kerberos S4U (MS-SFU) incluye una funcionalidad que permite a un subconjunto de clientes ser excluidos de la delegaci\u00f3n restringida de cualquier manera, ya sea S4U2Self o autenticaci\u00f3n Kerberos regular, al forzar que todos los tickets para estos clientes no sean reenviables. En AD, esto es implementado mediante un atributo de usuario delegation_not_allowed (tambi\u00e9n se conoce como no delegado), que se traduce como no permitido-reenviable. Sin embargo, el AD DC Samba no hace eso para S4U2Self y establece el flag reenviable inclusive si el cliente suplantado tiene el conjunto de flags no delegados."
    }
  ],
  "id": "CVE-2019-14870",
  "lastModified": "2024-11-21T04:27:33.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-10T23:15:10.457",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202310-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20191210-0002/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4217-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4217-2/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14870.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_40"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14870"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00034.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202310-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20191210-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20230216-0008/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4217-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4217-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14870.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_40"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-285"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-06-06 21:29
Modified
2025-04-20 01:37
Summary
smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks.
References
cve@mitre.orghttp://www.securityfocus.com/bid/99455Third Party Advisory, VDB Entry
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:1950Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:2338Third Party Advisory
cve@mitre.orghttps://access.redhat.com/errata/RHSA-2017:2778Third Party Advisory
cve@mitre.orghttps://bugs.debian.org/864291Exploit, Issue Tracking, Patch, Third Party Advisory
cve@mitre.orghttps://bugzilla.samba.org/show_bug.cgi?id=12572Exploit, Issue Tracking, Patch, Third Party Advisory, VDB Entry
cve@mitre.orghttps://git.samba.org/?p=samba.git%3Ba=commit%3Bh=10c3e3923022485c720f322ca4f0aca5d7501310
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2019/04/msg00013.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/99455Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1950Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:2338Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:2778Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugs.debian.org/864291Exploit, Issue Tracking, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=12572Exploit, Issue Tracking, Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=10c3e3923022485c720f322ca4f0aca5d7501310
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2019/04/msg00013.htmlThird Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCA1676B-E93D-4B1B-87EB-5E9A3F38C13A",
              "versionEndIncluding": "4.4.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8400346B-095A-4022-A454-1E0782B66357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F44626-3477-4804-88D7-847DEC41AA2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C992A5CB-44AF-4F93-934B-D6995886B2D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ACE5BE1-B4A8-4B91-AC51-146C82AB8E44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "29627C2E-FA74-4908-9AFC-6721AD841CC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1612767-5F6E-450C-ADC0-75612C7B5B5A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "smbd in Samba before 4.4.10 and 4.5.x before 4.5.6 has a denial of service vulnerability (fd_open_atomic infinite loop with high CPU usage and memory consumption) due to wrongly handling dangling symlinks."
    },
    {
      "lang": "es",
      "value": "smbd en Samba versiones anteriores a 4.4.10 y 4.5.x versiones anteriores a 4.5.6, tienen una vulnerabilidad de denegaci\u00f3n de servicio (fd_open_atomic infinite loop con un alto uso de CPU y consumo de memoria) debido a un manejo inadecuado de los enlaces simb\u00f3licos colgantes."
    }
  ],
  "id": "CVE-2017-9461",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-06-06T21:29:00.313",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99455"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1950"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2338"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2778"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugs.debian.org/864291"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=12572"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=10c3e3923022485c720f322ca4f0aca5d7501310"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/99455"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1950"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2338"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:2778"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugs.debian.org/864291"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=12572"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=10c3e3923022485c720f322ca4f0aca5d7501310"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00013.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-835"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-12-29 22:59
Modified
2025-04-12 10:46
Summary
The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restrictions by leveraging the existence of a domain with both a Samba DC and a Windows DC, a similar issue to CVE-2015-2535.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.htmlMailing List, Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2016/dsa-3433Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/79735Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1034493Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2855-1Third Party Advisory
cve@mitre.orghttp://www.ubuntu.com/usn/USN-2855-2Third Party Advisory
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=1290294Issue Tracking, Third Party Advisory
cve@mitre.orghttps://git.samba.org/?p=samba.git%3Ba=commit%3Bh=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d
cve@mitre.orghttps://security.gentoo.org/glsa/201612-47Third Party Advisory
cve@mitre.orghttps://www.samba.org/samba/security/CVE-2015-8467.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3433Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/79735Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1034493Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2855-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2855-2Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1290294Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201612-47Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2015-8467.htmlVendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "821BC21F-2B2C-4DE2-8EF6-BBC47DA8433B",
              "versionEndExcluding": "4.1.22",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEE374EB-8CEF-4E2E-B323-22397E34BD4A",
              "versionEndExcluding": "4.2.7",
              "versionStartIncluding": "4.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6683E050-3788-41B4-BA5D-32ACDFE79648",
              "versionEndExcluding": "4.3.3",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "F38D3B7E-8429-473F-BB31-FC3583EE5A5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The samldb_check_user_account_control_acl function in dsdb/samdb/ldb_modules/samldb.c in Samba 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3 does not properly check for administrative privileges during creation of machine accounts, which allows remote authenticated users to bypass intended access restrictions by leveraging the existence of a domain with both a Samba DC and a Windows DC, a similar issue to CVE-2015-2535."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n samldb_check_user_account_control_acl en dsdb/samdb/ldb_modules/samldb.c en Samba 4.x en versiones anteriores a 4.1.22, 4.2.x en versiones anteriores a 4.2.7 y 4.3.x en versiones anteriores a 4.3.3 no comprueba adecuadamente los privilegios administrativos durante la creaci\u00f3n de cuentas de m\u00e1quina, lo que permite a usuarios remotos autenticados eludir las restricciones de acceso destinadas aprovechando la existencia de un dominio tanto con un Samba DC como con un Windows DC, un caso similar a CVE-2015-2535"
    }
  ],
  "id": "CVE-2015-8467",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2015-12-29T22:59:07.547",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3433"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/79735"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1034493"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2855-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2855-2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290294"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2015-8467.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00032.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00033.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3433"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/79735"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1034493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2855-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2855-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1290294"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.samba.org/?p=samba.git%3Ba=commit%3Bh=b000da128b5fb519d2d3f2e7fd20e4a25b7dae7d"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2015-8467.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack.
Impacted products
Vendor Product Version
samba samba *
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 2.0.0
samba samba 2.0.5a
samba samba 2.2.1
samba samba 2.2.1a
samba samba 2.2.3a
samba samba 2.2a



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F69ED4B5-C485-4996-8AAE-F3800D37170F",
              "versionEndIncluding": "2.2.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B50D9E-EA43-44BF-9176-610EC808B986",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p1:*:*:*:*:*:*",
              "matchCriteriaId": "BCBBF662-40C3-4280-BE79-9D7C36A6DF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p3:*:*:*:*:*:*",
              "matchCriteriaId": "BDD6A6AE-C636-4131-807B-59F7784B7AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8C6D63F5-B72C-445A-BC61-D52D6022481B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p5:*:*:*:*:*:*",
              "matchCriteriaId": "1ADD724A-1747-4678-A659-0A528B728C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p1:*:*:*:*:*:*",
              "matchCriteriaId": "A3ABEA3A-8F88-4947-80A5-CF1459F5AC8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p10:*:*:*:*:*:*",
              "matchCriteriaId": "86F85E94-9F94-457A-A606-35DB558484A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p2:*:*:*:*:*:*",
              "matchCriteriaId": "1ED4704B-2422-43C9-A2E0-9851F56D4CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p3:*:*:*:*:*:*",
              "matchCriteriaId": "158D175A-E0D7-45EF-BDD2-D86F2E8F7766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p4:*:*:*:*:*:*",
              "matchCriteriaId": "7854FCEF-D1F8-4DEC-A6CB-C4470899F71C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p5:*:*:*:*:*:*",
              "matchCriteriaId": "36D8B675-C209-4D5A-8EA7-1B3515E930FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p6:*:*:*:*:*:*",
              "matchCriteriaId": "4BCECF31-4C73-4ABA-9F84-D5DBA1DB1F50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p7:*:*:*:*:*:*",
              "matchCriteriaId": "2C5A1382-D147-43E5-8DB7-93B7A3B9AA0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p8:*:*:*:*:*:*",
              "matchCriteriaId": "3A497A5D-96FC-490E-87EB-94C1BE7338A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F681E4CC-B8D3-48A2-B93E-0363B22B059E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDD0125-4C47-404A-9DC0-2E923C66B4D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCACECDD-40F1-4A9B-8B8A-20565FEE3627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "19F65FF3-71F8-4278-A823-A6E0FF65D9F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "614547F5-9C3F-489B-9B72-91B0FF646CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC2AE5A9-62C5-4DCE-85B3-16F48695B3B4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack."
    }
  ],
  "id": "CVE-2002-2196",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.samba.org/archive/samba-technical/2002-June/022075.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHBA-2002-209.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.iss.net/security_center/static/10010.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/5587"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.samba.org/archive/samba-technical/2002-June/022075.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHBA-2002-209.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.iss.net/security_center/static/10010.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/5587"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue did not affect the versions of Samba as distributed with Red Hat Enterprise Linux 2.1, 3, or 4.",
      "lastModified": "2006-08-30T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-11-01 13:29
Modified
2024-11-21 02:47
Summary
A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BE2A2A4-C5C3-4B74-8550-60E28DFF9767",
              "versionEndIncluding": "4.0.26",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2D56198-E93C-4236-BA13-740382F05D1F",
              "versionEndIncluding": "4.1.23",
              "versionStartIncluding": "4.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "381D0FF3-BC92-44D5-8EF0-15EFA16EF230",
              "versionEndIncluding": "4.2.14",
              "versionStartIncluding": "4.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DD56F61-8F6B-46AD-9A99-6A68C9110A04",
              "versionEndExcluding": "4.3.13",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A963A86-CAF4-4882-B9DC-E9C7CDA2764C",
              "versionEndExcluding": "4.4.8",
              "versionStartIncluding": "4.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6044E13A-532E-403E-AA23-4A77771D2094",
              "versionEndExcluding": "4.5.3",
              "versionStartIncluding": "4.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in samba versions 4.0.0 to 4.5.2. The Samba routine ndr_pull_dnsp_name contains an integer wrap problem, leading to an attacker-controlled memory overwrite. ndr_pull_dnsp_name parses data from the Samba Active Directory ldb database. Any user who can write to the dnsRecord attribute over LDAP can trigger this memory corruption. By default, all authenticated LDAP users can write to the dnsRecord attribute on new DNS objects. This makes the defect a remote privilege escalation."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un error en Samba, de la versi\u00f3n 4.0.0 a la 4.5.2. La rutina de Samba ndr_pull_dnsp_name contiene un problema de envoltorio de enteros que conduce a una sobrescritura de memoria controlada por el atacante. ndr_pull_dnsp_name analiza datos de la base de datos ldb Samba Active Directory. Cualquier usuario que pueda escribir en el atributo dnsRecord mediante LDAP puede desencadenar esta corrupci\u00f3n de memoria. Por defecto, todos los usuarios LDAP autenticados pueden escribir en el atributo dnsRecord en nuevos objetos DNS. Esto provoca un escalado de privilegios remotos."
    }
  ],
  "id": "CVE-2016-2123",
  "lastModified": "2024-11-21T02:47:52.640",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-11-01T13:29:00.363",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94970"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1037493"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2123"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2123.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94970"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1037493"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-2123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2123.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-122"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-25 18:15
Modified
2024-11-21 07:06
Summary
A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22161FC4-92E0-4340-A844-BA2DF50C94E7",
              "versionEndExcluding": "4.14.14",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E54A3-23C1-497D-864D-EDF15D85FB81",
              "versionEndExcluding": "4.15.9",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8479455F-FFCD-46F1-B0E3-EBC082F89C16",
              "versionEndExcluding": "4.16.4",
              "versionStartIncluding": "4.16.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in the Samba AD LDAP server. The AD DC database audit logging module can access LDAP message values freed by a preceding database module, resulting in a use-after-free issue. This issue is only possible when modifying certain privileged attributes, such as userAccountControl."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo en el servidor LDAP de Samba AD. El m\u00f3dulo de registro de auditor\u00eda de la base de datos AD DC puede acceder a los valores de los mensajes LDAP liberados por un m\u00f3dulo de base de datos anterior, resultando en un problema de uso de memoria previamente liberada. Este problema s\u00f3lo es posible cuando son modificados determinados atributos privilegiados, como userAccountControl."
    }
  ],
  "id": "CVE-2022-32746",
  "lastModified": "2024-11-21T07:06:52.830",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-25T18:15:10.633",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-32746.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-32746.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-04-30 14:55
Modified
2025-04-11 00:51
Severity ?
Summary
The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the "take ownership" privilege via an LSA connection.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=134323086902585&w=2
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=134323086902585&w=2
secalert@redhat.comhttp://osvdb.org/81648
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2012-0533.html
secalert@redhat.comhttp://secunia.com/advisories/48976
secalert@redhat.comhttp://secunia.com/advisories/48984
secalert@redhat.comhttp://secunia.com/advisories/48996
secalert@redhat.comhttp://secunia.com/advisories/48999
secalert@redhat.comhttp://secunia.com/advisories/49017
secalert@redhat.comhttp://secunia.com/advisories/49030
secalert@redhat.comhttp://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2463
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2012:067
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2012-2111Patch, Vendor Advisory
secalert@redhat.comhttp://www.securitytracker.com/id?1026988
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1434-1
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=134323086902585&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=134323086902585&w=2
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/81648
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2012-0533.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48976
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48984
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48996
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/48999
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49017
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49030
af854a3a-2127-422b-91ae-364da2661108http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2463
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2012:067
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2012-2111Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1026988
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1434-1
Impacted products
Vendor Product Version
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4
samba samba 3.4.5
samba samba 3.4.6
samba samba 3.4.7
samba samba 3.4.8
samba samba 3.4.9
samba samba 3.4.10
samba samba 3.4.11
samba samba 3.4.12
samba samba 3.4.13
samba samba 3.4.14
samba samba 3.4.15
samba samba 3.4.16
samba samba 3.5.0
samba samba 3.5.1
samba samba 3.5.2
samba samba 3.5.3
samba samba 3.5.4
samba samba 3.5.5
samba samba 3.5.6
samba samba 3.5.7
samba samba 3.5.8
samba samba 3.5.9
samba samba 3.5.10
samba samba 3.5.11
samba samba 3.5.12
samba samba 3.5.13
samba samba 3.5.14
samba samba 3.6.0
samba samba 3.6.1
samba samba 3.6.2
samba samba 3.6.3
samba samba 3.6.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C93E46D-FDEA-4B59-8C84-8A3DCC6AB3EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4633D2E-2CBE-4B92-AD35-ED57C5399ABF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F200FC8-DA2E-4D39-8FF7-423759307DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "75B7341D-B02F-405B-81A0-5F74CFA8F8E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "E207B352-D8F8-4E15-9507-D3AD10D56211",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0CBA51B-159F-42E9-8A2C-2B9BF1EB7D98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8F01226-D9E6-460C-975A-618932D5F16F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD98764-741C-4FED-BE4D-446E8E8D31F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "4048DF8D-628D-4786-A883-0A1865DEBB2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "77E7A4E4-940B-43C4-98A2-70F443A59120",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC8C2E40-DA05-4B50-AB29-398AF71EBECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED5E81ED-032F-42B7-9D50-15CADE337AD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADA12C8C-2E4E-4321-8C45-71DD6A29E0E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FDD90A4-B50B-4640-ADDE-B75BBC34507C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACFC3804-991A-4BAF-818E-E321DB21FB7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CE1B4D9-507A-43B2-81F3-77E411ABEF7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "857FCD47-F720-4273-BF1D-D5DC95ECA6D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B8FE4AC-6E71-44CF-902D-BACA830C4CA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EE762A-F95F-42CF-BB80-B0EF81A438EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "738095D8-8ACE-4CF4-9D97-4228FC686F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D4634FC-DA4E-4B1D-B1AB-A45D8235780D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA83A66-BD39-4560-8EAF-ADF2433EF36D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "21B1F854-FC98-4DE9-8514-FD52301C5038",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BD1356E-3B43-4C5B-9969-902440918EE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7F3209-B376-490B-A761-2CCB6CEE209A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "406C2297-B58D-4623-9E7A-2C438ABBAC93",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6AF0DD4-08D4-4726-8A12-E979FF3322B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, and (4) RemoveAccountRights LSA RPC procedures in smbd in Samba 3.4.x before 3.4.17, 3.5.x before 3.5.15, and 3.6.x before 3.6.5 do not properly restrict modifications to the privileges database, which allows remote authenticated users to obtain the \"take ownership\" privilege via an LSA connection."
    },
    {
      "lang": "es",
      "value": "El (1) CreateAccount, (2) OpenAccount, (3) AddAccountRights, y (4) RemoveAccountRights LSA RPC procedimientos en smbd de Samba v3.4.x anterior a v3.4.17, v3.5.x anterior a v3.5.15 y  v3.6.x anterior a v3.6.5 no restringe correctamente las modificaciones en la base de datos de privilegios, permitiendo a usuarios remotos autenticados  obtener la \"toma de posesi\u00f3n\"  de privilegios a trav\u00e9s de una conexi\u00f3n LSA."
    }
  ],
  "id": "CVE-2012-2111",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-04-30T14:55:03.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/81648"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-0533.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48976"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48984"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48996"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/48999"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/49017"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/49030"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2463"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:067"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2012-2111"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1026988"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1434-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079662.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079670.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-May/079677.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=134323086902585\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/81648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2012-0533.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48976"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48984"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48996"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/48999"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/49030"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.collax.com/produkte/AllinOne-server-for-small-businesses#id2565578"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:067"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2012-2111"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1026988"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1434-1"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-03-02 18:30
Modified
2025-04-11 00:51
Severity ?
Summary
client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
References
cve@mitre.orghttp://git.samba.org/?p=samba.git%3Ba=commit%3Bh=3ae5dac462c4ed0fb2cd94553583c56fce2f9d80
cve@mitre.orghttp://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a0c31ec1c8d1220a5884e40d9ba6b191a04a24d5
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-January/034444.html
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2010-January/034470.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
cve@mitre.orghttp://secunia.com/advisories/38286Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/38308Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/38357Vendor Advisory
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-201206-29.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2010:090
cve@mitre.orghttp://www.securityfocus.com/bid/37992Patch
cve@mitre.orghttp://www.securityfocus.com/bid/39898
cve@mitre.orghttp://www.ubuntu.com/usn/USN-893-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/1062
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=532940
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=558833
cve@mitre.orghttps://bugzilla.samba.org/show_bug.cgi?id=6853Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/55944
af854a3a-2127-422b-91ae-364da2661108http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=3ae5dac462c4ed0fb2cd94553583c56fce2f9d80
af854a3a-2127-422b-91ae-364da2661108http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a0c31ec1c8d1220a5884e40d9ba6b191a04a24d5
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034444.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034470.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38286Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38308Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/38357Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-201206-29.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:090
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/37992Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/39898
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-893-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1062
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=532940
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=558833
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=6853Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/55944
Impacted products
Vendor Product Version
samba samba 3.0.22
samba samba 3.0.28a
samba samba 3.2.3
samba samba 3.4.0
samba samba 3.4.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3AA114-63C8-4B25-86BA-73C6933EE21F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file."
    },
    {
      "lang": "es",
      "value": "client/mount.cifs.c en mount.cifs en smbfs en Samba v3.0.22, v3.0.28a, v3.2.3, v3.3.2, v3.4.0, and v3.4.5 permite a usuarios locales montar un CIFS compartido en un punto de montaje arbitrario y ganar privilegios, a trav\u00e9s de un ataque de enlace simb\u00f3lico en un fichero del directorio del punto de montaje."
    }
  ],
  "id": "CVE-2010-0787",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-03-02T18:30:01.040",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=3ae5dac462c4ed0fb2cd94553583c56fce2f9d80"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a0c31ec1c8d1220a5884e40d9ba6b191a04a24d5"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034444.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034470.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38286"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38308"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38357"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-201206-29.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:090"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/37992"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/39898"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-893-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/1062"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532940"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558833"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=6853"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55944"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=3ae5dac462c4ed0fb2cd94553583c56fce2f9d80"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=a0c31ec1c8d1220a5884e40d9ba6b191a04a24d5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034444.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034470.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-08/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38286"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38308"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/38357"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201206-29.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:090"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/37992"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/39898"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-893-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1062"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532940"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=558833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=6853"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/55944"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "This issue has been addressed via RHSA-2011:1219 (https://rhn.redhat.com/errata/RHSA-2011-1219.html).",
      "lastModified": "2011-08-29T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-08-22 17:29
Modified
2024-11-21 03:42
Summary
The Samba Active Directory LDAP server was vulnerable to an information disclosure flaw because of missing access control checks. An authenticated attacker could use this flaw to extract confidential attribute values using LDAP search expressions. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3FDA4C7-6C53-401C-A133-D5B4299FE185",
              "versionEndExcluding": "4.6.16",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2D88D65-4DCC-44B4-9671-1D2C5FE598D9",
              "versionEndExcluding": "4.7.9",
              "versionStartIncluding": "4.7.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E405D2-03BC-4808-A8F1-1C4BF24CFCCA",
              "versionEndExcluding": "4.8.4",
              "versionStartIncluding": "4.8.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Samba Active Directory LDAP server was vulnerable to an information disclosure flaw because of missing access control checks. An authenticated attacker could use this flaw to extract confidential attribute values using LDAP search expressions. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable."
    },
    {
      "lang": "es",
      "value": "El servidor Samba Active Directory LDAP era vulnerable a una divulgaci\u00f3n de informaci\u00f3n debido a la ausencia de comprobaciones de control de acceso. Un atacante autenticado podr\u00eda utilizar este fallo para extraer valores de atributo confidenciales utilizando expresiones de b\u00fasqueda LDAP. Las versiones 4.6.16, 4.7.9 y 4.8.4 de samba son vulnerables."
    }
  ],
  "id": "CVE-2018-10919",
  "lastModified": "2024-11-21T03:42:18.223",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-08-22T17:29:00.603",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105081"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180814-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3738-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4271"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-10919.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/105081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20180814-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/3738-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4271"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-10919.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-203"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-09-15 18:00
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
References
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2011//Jun/msg00000.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.apple.com/archives/security-announce/2011/Mar/msg00006.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=130835366526620&w=2Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=130835366526620&w=2Mailing List, Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/41354Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/41447Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/42531Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/42885Third Party Advisory
secalert@redhat.comhttp://support.apple.com/kb/HT4581Third Party Advisory
secalert@redhat.comhttp://support.apple.com/kb/HT4723Third Party Advisory
secalert@redhat.comhttp://us1.samba.org/samba/history/samba-3.5.5.htmlVendor Advisory
secalert@redhat.comhttp://us1.samba.org/samba/security/CVE-2010-3069.htmlVendor Advisory
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2010-0860.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/515055/100/0/threadedThird Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/bid/43212Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id?1024434Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-987-1Third Party Advisory
secalert@redhat.comhttp://www.vmware.com/security/advisories/VMSA-2010-0019.htmlPermissions Required, Third Party Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/2378Permissions Required
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/3126Permissions Required
secalert@redhat.comhttp://www.vupen.com/english/advisories/2011/0091Permissions Required
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/61773VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=130835366526620&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=130835366526620&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/41354Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/41447Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42531Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/42885Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4581Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT4723Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://us1.samba.org/samba/history/samba-3.5.5.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://us1.samba.org/samba/security/CVE-2010-3069.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2010-0860.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/515055/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/43212Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1024434Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-987-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/security/advisories/VMSA-2010-0019.htmlPermissions Required, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/2378Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/3126Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2011/0091Permissions Required
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/61773VDB Entry
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3499F11-574E-4E63-B3F9-E0E41480DFEA",
              "versionEndIncluding": "3.3.14",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA1386E2-E375-4711-A724-A97E44CA07D6",
              "versionEndExcluding": "3.4.9",
              "versionStartIncluding": "3.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB464A7C-88DC-4560-9256-C264F5385C57",
              "versionEndExcluding": "3.5.5",
              "versionStartIncluding": "3.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D026D0-EF78-438D-BEDD-FC8571F3ACEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BCB73E-27BB-4878-AD9C-90C4F20C25A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de b\u00fafer basado en pila en las funciones (1) sid_parse y (2) dom_sid_parse en Samba anterior a v3.5.5 permite a los atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de Windows Security ID (SID) manipulados en un fichero compartido."
    }
  ],
  "id": "CVE-2010-3069",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-09-15T18:00:44.400",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/41354"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/41447"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/42531"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/42885"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT4581"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://us1.samba.org/samba/history/samba-3.5.5.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://us1.samba.org/samba/security/CVE-2010-3069.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0860.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/43212"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1024434"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-987-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2378"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/3126"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0091"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61773"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2011//Jun/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047650.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047697.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-September/047758.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=130835366526620\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/41354"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/41447"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/42531"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/42885"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT4581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://support.apple.com/kb/HT4723"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://us1.samba.org/samba/history/samba-3.5.5.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://us1.samba.org/samba/security/CVE-2010-3069.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2010-0860.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/515055/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/43212"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1024434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-987-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Third Party Advisory"
      ],
      "url": "http://www.vmware.com/security/advisories/VMSA-2010-0019.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/2378"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/3126"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2011/0091"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/61773"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-11 16:15
Modified
2024-11-21 06:29
Summary
All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.
Impacted products
Vendor Product Version
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7CDF46B-0749-4D41-B5E9-A94CF1A5F083",
              "versionEndExcluding": "4.13.16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed."
    },
    {
      "lang": "es",
      "value": "Todas las versiones de Samba anteriores a 4.13.16, son vulnerables a que un cliente malicioso use una carrera SMB1 o NFS para permitir la creaci\u00f3n de un directorio en un \u00e1rea del sistema de archivos del servidor no exportada bajo la definici\u00f3n del recurso compartido. Tenga en cuenta que SMB1 tiene que estar habilitado, o el recurso compartido tambi\u00e9n disponible por medio de NFS para que este ataque tenga \u00e9xito"
    }
  ],
  "id": "CVE-2021-43566",
  "lastModified": "2024-11-21T06:29:27.177",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 1.2,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 1.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 2.5,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-11T16:15:07.813",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=13979"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20220110-0001/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2021-43566.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=13979"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20220110-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2021-43566.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-09-14 01:17
Modified
2025-04-09 00:30
Severity ?
Summary
The Winbind nss_info extension (nsswitch/idmap_ad.c) in idmap_ad.so in Samba 3.0.25 through 3.0.25c, when the "winbind nss info" option is set to rfc2307 or sfu, grants all local users the privileges of gid 0 when the (1) RFC2307 or (2) Services for UNIX (SFU) primary group attribute is not defined.
References
secalert@redhat.comhttp://docs.info.apple.com/article.html?artnum=307179
secalert@redhat.comhttp://secunia.com/advisories/26764Patch, Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/26776
secalert@redhat.comhttp://secunia.com/advisories/26795
secalert@redhat.comhttp://secunia.com/advisories/26834
secalert@redhat.comhttp://securityreason.com/securityalert/3135
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.419439
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-1016.html
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2007-1017.html
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2007-4138.html
secalert@redhat.comhttp://www.securityfocus.com/archive/1/479078/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/25636Patch
secalert@redhat.comhttp://www.securitytracker.com/id?1018681
secalert@redhat.comhttp://www.us-cert.gov/cas/techalerts/TA07-352A.htmlUS Government Resource
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/3120
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/36560
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-1705
secalert@redhat.comhttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10375
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2007-September/msg00201.html
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=307179
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26764Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26776
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26795
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26834
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3135
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.419439
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1016.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2007-1017.html
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2007-4138.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/479078/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25636Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018681
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA07-352A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3120
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/36560
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1705
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10375
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00201.html
Impacted products
Vendor Product Version
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Winbind nss_info extension (nsswitch/idmap_ad.c) in idmap_ad.so in Samba 3.0.25 through 3.0.25c, when the \"winbind nss info\" option is set to rfc2307 or sfu, grants all local users the privileges of gid 0 when the (1) RFC2307 or (2) Services for UNIX (SFU) primary group attribute is not defined."
    },
    {
      "lang": "es",
      "value": "La extensi\u00f3n Winbind nss_info (nsswitch/idmap_ad.c) en idmap_ad.so de Samba 3.0.25 hasta 3.0.25c, cuando la opci\u00f3n \"winbind nss info\" est\u00e1 asignada a rfc2307 \u00f3 sfu, concede a todos los usuarios locales el privilegio de gid 0 cuando el atributo de grupo primario (1) RFC2307 \u00f3 (2) Services for UNIX (SFU) no est\u00e1 definido."
    }
  ],
  "id": "CVE-2007-4138",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-09-14T01:17:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://docs.info.apple.com/article.html?artnum=307179"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26764"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26776"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26795"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/26834"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securityreason.com/securityalert/3135"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.419439"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1016.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1017.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.samba.org/samba/security/CVE-2007-4138.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/479078/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25636"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1018681"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2007/3120"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36560"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://issues.rpath.com/browse/RPL-1705"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10375"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00201.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=307179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26764"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26776"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26795"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3135"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.419439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1016.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2007-1017.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/security/CVE-2007-4138.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/479078/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25636"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1018681"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA07-352A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3120"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36560"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://issues.rpath.com/browse/RPL-1705"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10375"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00201.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Not vulnerable. These issues did not affect the versions of Samba as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.",
      "lastModified": "2007-09-18T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-31 20:15
Modified
2024-11-21 01:30
Summary
Multiple race conditions in the (1) mount.cifs and (2) umount.cifs programs in Samba 3.6 allow local users to cause a denial of service (mounting outage) via a SIGKILL signal during a time window when the /etc/mtab~ file exists.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "66999F57-FF99-419F-BB12-35DC79FCE945",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6172AF57-B26D-45F8-BE3A-F75ABDF28F49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple race conditions in the (1) mount.cifs and (2) umount.cifs programs in Samba 3.6 allow local users to cause a denial of service (mounting outage) via a SIGKILL signal during a time window when the /etc/mtab~ file exists."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples condiciones de carrera en los programas (1) mount.cifs y (2) umount.cifs en Samba versi\u00f3n 3.6, permiten a usuarios locales causar una denegaci\u00f3n de servicio (interrupci\u00f3n del montaje) por medio de una se\u00f1al SIGKILL durante una ventana de tiempo cuando existe el archivo /etc/mtab~."
    }
  ],
  "id": "CVE-2011-3585",
  "lastModified": "2024-11-21T01:30:48.023",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 1.9,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 4.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-31T20:15:11.060",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=742907"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=7179"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://git.samba.org/?p=cifs-utils.git%3Ba=commitdiff%3Bh=810f7e4e0f2dbcbee0294d9b371071cb08268200"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2011/09/27/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2011/09/30/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=742907"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=7179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://git.samba.org/?p=cifs-utils.git%3Ba=commitdiff%3Bh=810f7e4e0f2dbcbee0294d9b371071cb08268200"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2011/09/27/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://www.openwall.com/lists/oss-security/2011/09/30/5"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-07-31 15:15
Modified
2024-11-21 03:53
Summary
A flaw was found in samba's Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
secalert@redhat.comhttp://seclists.org/fulldisclosure/2019/Aug/11
secalert@redhat.comhttp://seclists.org/fulldisclosure/2019/Aug/13
secalert@redhat.comhttp://seclists.org/fulldisclosure/2019/Aug/14
secalert@redhat.comhttp://seclists.org/fulldisclosure/2019/Aug/15
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://seclists.org/bugtraq/2019/Aug/21
secalert@redhat.comhttps://seclists.org/bugtraq/2019/Aug/22
secalert@redhat.comhttps://seclists.org/bugtraq/2019/Aug/23
secalert@redhat.comhttps://seclists.org/bugtraq/2019/Aug/25
secalert@redhat.comhttps://security.gentoo.org/glsa/202003-52
secalert@redhat.comhttps://support.apple.com/HT210346
secalert@redhat.comhttps://support.apple.com/HT210348
secalert@redhat.comhttps://support.apple.com/HT210351
secalert@redhat.comhttps://support.apple.com/HT210353
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2018-16860.htmlMitigation, Vendor Advisory
secalert@redhat.comhttps://www.synology.com/security/advisory/Synology_SA_19_23
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2019/Aug/11
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2019/Aug/13
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2019/Aug/14
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2019/Aug/15
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Aug/21
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Aug/22
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Aug/23
af854a3a-2127-422b-91ae-364da2661108https://seclists.org/bugtraq/2019/Aug/25
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202003-52
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT210346
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT210348
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT210351
af854a3a-2127-422b-91ae-364da2661108https://support.apple.com/HT210353
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2018-16860.htmlMitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/security/advisory/Synology_SA_19_23
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
heimdal_project heimdal *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04E9BEFE-FF93-4C6F-B76D-6B8CFE1E5BDD",
              "versionEndExcluding": "4.8.12",
              "versionStartIncluding": "4.8.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35DB3E08-0131-4AF2-AB27-D51B401D7D45",
              "versionEndExcluding": "4.9.8",
              "versionStartIncluding": "4.9.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "895BEC8B-ADBC-4575-B07E-3149A613C4ED",
              "versionEndExcluding": "4.10.3",
              "versionStartIncluding": "4.10.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "683A4E25-64AF-46AC-BAA8-E56BD9C9840F",
              "versionEndIncluding": "7.5.0",
              "versionStartIncluding": "0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in samba\u0027s Heimdal KDC implementation, versions 4.8.x up to, excluding 4.8.12, 4.9.x up to, excluding 4.9.8 and 4.10.x up to, excluding 4.10.3, when used in AD DC mode. A man in the middle attacker could use this flaw to intercept the request to the KDC and replace the user name (principal) in the request with any desired user name (principal) that exists in the KDC effectively obtaining a ticket for that principal."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo en la implementaci\u00f3n de Heimdal KDC de samba, versiones 4.8.x hasta 4.8.12 excluy\u00e9ndola, versiones 4.9.x hasta 4.9.8 excluy\u00e9ndola, y versiones 4.10.x hasta 4.10.3 excluy\u00e9ndola, cuando es usado en modo AD DC . Un atacante de tipo man in the middle podr\u00eda usar este fallo para interceptar la petici\u00f3n al KDC y reemplazar el nombre de usuario (principal) en la petici\u00f3n con cualquier nombre de usuario (principal) deseado que exista en el KDC obteniendo efectivamente un ticket para este principal."
    }
  ],
  "id": "CVE-2018-16860",
  "lastModified": "2024-11-21T03:53:28.003",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.9,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-31T15:15:11.687",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://seclists.org/bugtraq/2019/Aug/21"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://seclists.org/bugtraq/2019/Aug/22"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://seclists.org/bugtraq/2019/Aug/23"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://seclists.org/bugtraq/2019/Aug/25"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://support.apple.com/HT210346"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://support.apple.com/HT210348"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://support.apple.com/HT210351"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://support.apple.com/HT210353"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-16860.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_23"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00026.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2019/Aug/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2019/Aug/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2019/Aug/14"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/fulldisclosure/2019/Aug/15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://seclists.org/bugtraq/2019/Aug/21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://seclists.org/bugtraq/2019/Aug/22"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://seclists.org/bugtraq/2019/Aug/23"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://seclists.org/bugtraq/2019/Aug/25"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.apple.com/HT210346"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.apple.com/HT210348"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.apple.com/HT210351"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.apple.com/HT210353"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2018-16860.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_23"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-358"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-358"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1997-09-30 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Samba has a buffer overflow which allows a remote attacker to obtain root access by specifying a long password.
Impacted products
Vendor Product Version
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:p2:*:*:*:*:*:*",
              "matchCriteriaId": "B89279AD-AAA6-478D-BAEA-B09D5AC043BB",
              "versionEndIncluding": "1.9.17",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba has a buffer overflow which allows a remote attacker to obtain root access by specifying a long password."
    }
  ],
  "id": "CVE-1999-0182",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1997-09-30T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.ciac.org/ciac/bulletins/h-110.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ciac.org/ciac/bulletins/h-110.shtml"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-10-02 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability on HP NonStop Servers with software H06.x through H06.23.00 and J06.x through J06.12.00, when Samba is used, allows remote authenticated users to execute arbitrary code via unknown vectors.
Impacted products
Vendor Product Version
samba samba *
hp nonstop_server *
hp nonstop_server_software h06.15.00
hp nonstop_server_software h06.15.01
hp nonstop_server_software h06.15.02
hp nonstop_server_software h06.16.00
hp nonstop_server_software h06.16.01
hp nonstop_server_software h06.16.02
hp nonstop_server_software h06.17.00
hp nonstop_server_software h06.17.01
hp nonstop_server_software h06.17.02
hp nonstop_server_software h06.17.03
hp nonstop_server_software h06.18.00
hp nonstop_server_software h06.18.01
hp nonstop_server_software h06.18.02
hp nonstop_server_software h06.19.00
hp nonstop_server_software h06.19.01
hp nonstop_server_software h06.19.02
hp nonstop_server_software h06.19.03
hp nonstop_server_software h06.20.00
hp nonstop_server_software h06.20.01
hp nonstop_server_software h06.20.02
hp nonstop_server_software h06.20.03
hp nonstop_server_software h06.21.00
hp nonstop_server_software h06.21.01
hp nonstop_server_software h06.21.02
hp nonstop_server_software h06.22.00
hp nonstop_server_software h06.22.01
hp nonstop_server_software h06.23.00
hp nonstop_server_software j06.04.00
hp nonstop_server_software j06.04.01
hp nonstop_server_software j06.04.02
hp nonstop_server_software j06.05.00
hp nonstop_server_software j06.05.01
hp nonstop_server_software j06.05.02
hp nonstop_server_software j06.06.00
hp nonstop_server_software j06.06.01
hp nonstop_server_software j06.06.02
hp nonstop_server_software j06.06.03
hp nonstop_server_software j06.07.00
hp nonstop_server_software j06.07.01
hp nonstop_server_software j06.07.02
hp nonstop_server_software j06.08.00
hp nonstop_server_software j06.08.01
hp nonstop_server_software j06.08.02
hp nonstop_server_software j06.08.03
hp nonstop_server_software j06.09.00
hp nonstop_server_software j06.09.01
hp nonstop_server_software j06.09.02
hp nonstop_server_software j06.09.03
hp nonstop_server_software j06.10.00
hp nonstop_server_software j06.10.01
hp nonstop_server_software j06.10.02
hp nonstop_server_software j06.11.00
hp nonstop_server_software j06.11.01
hp nonstop_server_software j06.12.00



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DE3327F-8070-4623-9177-DB52C8F38C29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:nonstop_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2709AD0-4D8A-4FB0-A5EE-7692C2A791A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.15.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2627417-D12F-4D95-8446-BA760C911157",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.15.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0F18DFD-2EC4-4959-A30A-538C82228835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.15.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2B8B5E4-8293-475E-B970-90CEB7D5429C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.16.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4D9D7BD-4444-4B76-9AA4-FDA9A01AF90D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.16.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "26A5BA8C-D019-41DB-A88B-B871E606D927",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.16.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "49DCEDB2-AA85-48B0-B0D7-E51F03B20D2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.17.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "2957D360-7E3B-47DE-813D-62561B20832F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.17.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "769BB272-FB3E-4379-AAA0-FDC438EB54E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.17.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "707051B0-5C55-4709-960A-8E49AFF836C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.17.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "C28B9092-8D77-4CBE-947B-648B319319D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.18.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "045DF881-ED50-40A7-8393-C365DF1FF938",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.18.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C9F6F24-D601-423C-A156-7A50A41DE300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.18.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "179BD73D-9C2B-4098-BC3E-0D5DD58EF7FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.19.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAB5456E-DF32-4668-9AA4-148062B1F532",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.19.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F2BBA95-0A27-4F10-B75E-FE76457574A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.19.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B7E1561-52FA-4964-BF0D-5A4E7D1A5798",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.19.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "60852FAF-8B95-4145-BB74-6C84D90D5E87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.20.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE5C24F0-1304-41D6-8726-7B8177BB0ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.20.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C05425-CF4D-42BF-8EFF-94257AE8D0ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.20.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "68F17A72-2003-46A7-A171-B106A01237A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.20.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F6C84C0-1DDD-4FA0-8648-608D6FB8A2BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.21.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE848466-DD59-4D8E-A620-88C9C55C143C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.21.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "89AF2B42-973B-4E89-9298-62E703F9D114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.21.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA41CBBF-9E28-4686-BE74-4E20B5B10770",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.22.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "13913917-195F-455C-8BD1-D88BDD46FC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.22.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "786FEB6D-386B-4B4E-B2F9-D3F8432328AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:h06.23.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F06DE7F6-E2D1-43AE-835D-9A760555B644",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.04.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "F006B858-5DBE-4B44-9B3E-42672DEAC3C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.04.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3A1C350-7DDF-40C3-BF2F-EFAA480DB61C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.04.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7F69943-D5E6-4187-9CAF-539EE1110EAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.05.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A3D4450-D2D0-4EB2-8FD8-3046CFE6860A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.05.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE5323E0-AFAE-4ACC-B267-5C65557FB5F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.05.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "154E78A0-4A95-4F20-91AE-B878F02AF71D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.06.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA3F5F9E-7446-47F7-A50C-6A6E26BE5658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.06.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFE5B01D-9B37-4A90-BB0C-D804A880446B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.06.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EB58918-FB73-49A6-8344-241A77A6B170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.06.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "509428FF-9C66-4271-8009-2D2B0A636D57",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.07.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "710F55FD-F512-4561-A0F7-87F241043C61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.07.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E151E7-0B9B-49B4-9C22-705B2F166C41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.07.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC782C96-4003-4BAD-BC6B-376429088E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.08.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "36804DE9-577A-4CB1-876A-5DF739085582",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.08.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E327F67-5D99-433B-942C-9F55F31364B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.08.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDE1808C-CE0F-4421-BE53-C5E47F8540B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.08.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "713A28A6-F06C-4590-A20B-DFAA6D04FB81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.09.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "C71CBAE4-43A8-4D64-B773-11902D4CAB90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.09.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11FD7ED-2565-472C-9004-23253B4DA174",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.09.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CF5A3FC-0685-435D-91D1-52913783E53D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.09.03:*:*:*:*:*:*:*",
              "matchCriteriaId": "E735AC5E-E4E1-42D0-AABE-E8831C567BFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.10.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "604DFAF2-17AC-4ABA-AAF1-E5BB89AF80E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.10.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "57C9F925-FC32-4C21-8DF4-4CECAF5EB8B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.10.02:*:*:*:*:*:*:*",
              "matchCriteriaId": "417D59F4-A9E5-4EF3-894A-CB0577E010D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "174D77D1-E1B6-4B79-AF71-B211E8C71B39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.11.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "154C9DED-C70A-4FA7-85B3-18F04AF41E8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:nonstop_server_software:j06.12.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC869C8-18FE-4A45-9DDD-681C5B69D0EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability on HP NonStop Servers with software H06.x through H06.23.00 and J06.x through J06.12.00, when Samba is used, allows remote authenticated users to execute arbitrary code via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en los servidores HP NonStop con software H06.x a trav\u00e9s de H06.23.00 y J06.x trav\u00e9s J06.12.00, cuando Samba se utiliza, permite a usuarios remotos autenticados ejecutar c\u00f3digo arbitrario a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2011-2411",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-10-02T20:55:00.867",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543"
    },
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-04-12 23:59
Modified
2025-04-12 10:46
Summary
The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka "BADLOCK."
References
secalert@redhat.comhttp://badlock.org/Technical Description, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0611.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0612.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0613.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0614.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0618.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0619.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0620.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0621.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0623.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0624.htmlThird Party Advisory
secalert@redhat.comhttp://rhn.redhat.com/errata/RHSA-2016-0625.htmlThird Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3548Third Party Advisory
secalert@redhat.comhttp://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlThird Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/86002Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1035533Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012Mailing List, Third Party Advisory
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-1Third Party Advisory
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-2Third Party Advisory
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-3Third Party Advisory
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-4Third Party Advisory
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2950-5Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/security/vulnerabilities/badlockThird Party Advisory
secalert@redhat.comhttps://bto.bluecoat.com/security-advisory/sa122Third Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399Third Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182Third Party Advisory
secalert@redhat.comhttps://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+FixesThird Party Advisory
secalert@redhat.comhttps://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-productsThird Party Advisory
secalert@redhat.comhttps://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196Third Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/201612-47Third Party Advisory
secalert@redhat.comhttps://www.kb.cert.org/vuls/id/813296Third Party Advisory, US Government Resource
secalert@redhat.comhttps://www.samba.org/samba/history/samba-4.2.10.htmlThird Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/latest_news.html#4.4.2Vendor Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2016-2118.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://badlock.org/Technical Description, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0611.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0612.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0613.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0614.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0618.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0619.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0620.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0621.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0623.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0624.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2016-0625.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3548Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/86002Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035533Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.458012Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-2Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-3Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-4Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2950-5Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/security/vulnerabilities/badlockThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bto.bluecoat.com/security-advisory/sa122Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+FixesThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-productsThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201612-47Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.kb.cert.org/vuls/id/813296Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/history/samba-4.2.10.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/latest_news.html#4.4.2Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2016-2118.htmlVendor Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5AD396C-0AAD-47F7-8001-2EE80E42531F",
              "versionEndExcluding": "4.2.10",
              "versionStartIncluding": "3.6.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE3D8FA9-4965-411D-AC14-E5749DC4A330",
              "versionEndExcluding": "4.3.7",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C7A7169-3A2E-4C90-A5F9-01B899693218",
              "versionEndExcluding": "4.4.1",
              "versionStartIncluding": "4.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "B5A6F2F3-4894-4392-8296-3B8DD2679084",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The MS-SAMR and MS-LSAD protocol implementations in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 mishandle DCERPC connections, which allows man-in-the-middle attackers to perform protocol-downgrade attacks and impersonate users by modifying the client-server data stream, aka \"BADLOCK.\""
    },
    {
      "lang": "es",
      "value": "Las implementaciones de protocolo MS-SAMR y MS-LSAD en Samba 3.x y 4.x en versiones anteriores a 4.2.11, 4.3.x en versiones anteriores a 4.3.8 y 4.4.x en versiones anteriores a 4.4.2 no maneja correctamente las conexiones DCERPC, lo que permite a atacantes man-in-the-middle llevar a cabo ataques de desactualizaci\u00f3n de protocolo y hacerse pasar por usuarios modificando el flujo de datos cliente-servidor, tambi\u00e9n conocida como \"BADLOCK\"."
    }
  ],
  "id": "CVE-2016-2118",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-04-12T23:59:37.497",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "http://badlock.org/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3548"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/86002"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1035533"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-3"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-4"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-5"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/vulnerabilities/badlock"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bto.bluecoat.com/security-advisory/sa122"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-products"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.kb.cert.org/vuls/id/813296"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2118.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "http://badlock.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182185.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182272.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-April/182288.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00021.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00024.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0611.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0612.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0613.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0614.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0618.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0619.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0620.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0621.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0623.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0624.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2016-0625.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/86002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1035533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2016\u0026m=slackware-security.458012"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2950-5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/vulnerabilities/badlock"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bto.bluecoat.com/security-advisory/sa122"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05162399"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05166182"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://kb.netapp.com/support/s/article/ka51A0000008SXzQAM/smb-vulnerabilities-in-multiple-netapp-products"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40196"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201612-47"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "https://www.kb.cert.org/vuls/id/813296"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.samba.org/samba/history/samba-4.2.10.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/latest_news.html#4.4.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2016-2118.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-254"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-09-14 16:30
Modified
2025-04-09 00:30
Severity ?
Summary
Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.
References
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=126514298313071&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=126514298313071&w=2
cve@mitre.orghttp://news.samba.org/releases/3.0.37/
cve@mitre.orghttp://news.samba.org/releases/3.2.15/
cve@mitre.orghttp://news.samba.org/releases/3.3.8/
cve@mitre.orghttp://news.samba.org/releases/3.4.2/
cve@mitre.orghttp://osvdb.org/57955
cve@mitre.orghttp://secunia.com/advisories/36701Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36893Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36918Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36937Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/36953Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/37428Vendor Advisory
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1
cve@mitre.orghttp://support.apple.com/kb/HT3865Vendor Advisory
cve@mitre.orghttp://wiki.rpath.com/Advisories:rPSA-2009-0145
cve@mitre.orghttp://www.samba.org/samba/security/CVE-2009-2813.htmlVendor Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/507856/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/36363
cve@mitre.orghttp://www.ubuntu.com/usn/USN-839-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/2810Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/53174
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=126514298313071&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=126514298313071&w=2
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.0.37/
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.2.15/
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.3.8/
af854a3a-2127-422b-91ae-364da2661108http://news.samba.org/releases/3.4.2/
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/57955
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36701Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36893Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36918Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36937Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/36953Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/37428Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.561439
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1
af854a3a-2127-422b-91ae-364da2661108http://support.apple.com/kb/HT3865Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://wiki.rpath.com/Advisories:rPSA-2009-0145
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2009-2813.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/507856/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/36363
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-839-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/2810Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/53174
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html
Impacted products
Vendor Product Version
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27
samba samba 3.0.27a
samba samba 3.0.28
samba samba 3.0.28a
samba samba 3.0.29
samba samba 3.0.30
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.0.34
samba samba 3.0.35
samba samba 3.0.36
samba samba 3.2
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12
samba samba 3.2.13
samba samba 3.2.14
samba samba 3.2.15
samba samba 3.3
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.4
samba samba 3.4.0
samba samba 3.4.1
apple mac_os_x 10.5.8
apple mac_os_x_server 10.5.8
fedoraproject fedora 11



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC24403-E706-4073-A04D-53E1B79B59B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3AA114-63C8-4B25-86BA-73C6933EE21F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE530BB9-A3ED-4EBB-B8E5-86D4CC5A8C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9E86C9-14FE-4C55-A08F-9A0C555260ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCD3046-85BB-40A6-A898-774833033891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "1335E35A-D381-4056-9E78-37BC6DF8AD98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "82B4CD59-9F37-4EF0-BA43-427CFD6E1329",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BB5EDB-520B-4DEF-B06E-65CA13152824",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories."
    },
    {
      "lang": "es",
      "value": "Samba 3.4 en versiones anteriores a 3.4.2, 3.3 en versiones anteriores a 3.3.8, 3.2 en versiones anteriores a 3.2.15 y 3.0.12 hasta la versi\u00f3n 3.0.36, como es utilizado en el subsistema SMB en Apple Mac OS X 10.5.8 cuando Windows File Sharing est\u00e1 habilitado, Fedora 11 y otros sistemas operativos, no maneja adecuadamente errores al resolver nombres de ruta, lo que permite a usuarios remotos autenticados eludir las restricciones previstas para los recursos compartidos as\u00ed como, leer, crear o modificar archivos, en determinadas circunstancias que involucran a las cuentas de usuario que carecen de directorios de inicio."
    }
  ],
  "id": "CVE-2009-2813",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-09-14T16:30:00.453",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=126514298313071\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=126514298313071\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://news.samba.org/releases/3.0.37/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://news.samba.org/releases/3.2.15/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://news.samba.org/releases/3.3.8/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://news.samba.org/releases/3.4.2/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/57955"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36701"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36893"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36918"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36937"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36953"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37428"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://support.apple.com/kb/HT3865"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2009-2813.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/36363"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-839-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2810"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53174"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=126514298313071\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=126514298313071\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://news.samba.org/releases/3.0.37/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://news.samba.org/releases/3.2.15/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://news.samba.org/releases/3.3.8/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://news.samba.org/releases/3.4.2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/57955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36701"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36893"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/36953"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37428"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2009\u0026m=slackware-security.561439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021111.1-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://support.apple.com/kb/HT3865"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0145"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2009-2813.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/507856/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/36363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-839-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/2810"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53174"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7211"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7257"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9191"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00095.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-October/msg00098.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-03-10 20:13
Modified
2025-04-11 00:51
Severity ?
Summary
smbd in Samba 3.3.11, 3.4.6, and 3.5.0, when libcap support is enabled, runs with the CAP_DAC_OVERRIDE capability, which allows remote authenticated users to bypass intended file permissions via standard filesystem operations with any client.
Impacted products
Vendor Product Version
samba samba 3.3.11
samba samba 3.4.6
samba samba 3.5.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "254D9460-899D-4D06-AC47-1914A42FC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "smbd in Samba 3.3.11, 3.4.6, and 3.5.0, when libcap support is enabled, runs with the CAP_DAC_OVERRIDE capability, which allows remote authenticated users to bypass intended file permissions via standard filesystem operations with any client."
    },
    {
      "lang": "es",
      "value": "smbd en Samba v3.3.11, v3.4.6, y v3.5.0, cuando el soporte libcap est\u00e1 activado, se ejecuta con la capacidad CAP_DAC_OVERRIDE, lo que permite a usuarios autenticados remotamente superar los permisos establecidos de archivos establecidos a trav\u00e9s de operaciones filesystem con cualquier cliente."
    }
  ],
  "id": "CVE-2010-0728",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.5,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-03-10T20:13:03.777",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.samba.org/archive/samba-announce/2010/000211.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.samba.org/samba/history/samba-3.3.12.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.samba.org/samba/history/samba-3.4.7.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.samba.org/samba/history/samba-3.5.1.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2010-0728"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=7222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://lists.samba.org/archive/samba-announce/2010/000211.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/history/samba-3.3.12.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/history/samba-3.4.7.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/history/samba-3.5.1.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2010-0728"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=7222"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Not vulnerable.\n\nThis issue did not affect the versions of the samba package, as shipped with Red Hat Enterprise Linux 3, 4, or 5.\n\nThis issue did not affect the version of the samba3x package, as shipped with Red Hat Enterprise Linux 5.",
      "lastModified": "2010-03-12T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1999-07-21 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Buffer overflow in Samba smbd program via a malformed message command.
Impacted products
Vendor Product Version
samba samba 2.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F15704-2F2B-4536-A2A0-510B5CE91D09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in Samba smbd program via a malformed message command."
    }
  ],
  "id": "CVE-1999-0811",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1999-07-21T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/536"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/536"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-05-30 18:29
Modified
2025-04-20 01:37
Summary
Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it.
References
secalert@redhat.comhttp://www.debian.org/security/2017/dsa-3860Third Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/98636Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1038552Third Party Advisory, VDB Entry
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2017:1270Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2017:1271Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2017:1272Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2017:1273Third Party Advisory
secalert@redhat.comhttps://access.redhat.com/errata/RHSA-2017:1390Third Party Advisory
secalert@redhat.comhttps://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01Third Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_usThird Party Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_usThird Party Advisory
secalert@redhat.comhttps://security.gentoo.org/glsa/201805-07Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20170524-0001/Third Party Advisory
secalert@redhat.comhttps://www.exploit-db.com/exploits/42060/Third Party Advisory, VDB Entry
secalert@redhat.comhttps://www.exploit-db.com/exploits/42084/Third Party Advisory, VDB Entry
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2017-7494.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2017/dsa-3860Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/98636Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1038552Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1270Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1271Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1272Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1273Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://access.redhat.com/errata/RHSA-2017:1390Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet&p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf&p_Doc_Ref=SEVD-2018-095-01Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03755en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03759en_usThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201805-07Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20170524-0001/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/42060/Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/42084/Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2017-7494.htmlPatch, Vendor Advisory
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
samba samba *
debian debian_linux 8.0



{
  "cisaActionDue": "2023-04-20",
  "cisaExploitAdd": "2023-03-30",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Samba Remote Code Execution Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF2ABA66-D242-45C8-A05C-B3C828692F34",
              "versionEndExcluding": "4.4.0",
              "versionStartIncluding": "3.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60CD8A70-8E75-44BD-8922-C3C92E02CECF",
              "versionEndExcluding": "4.4.14",
              "versionStartIncluding": "4.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A15B468-4997-4E21-9975-9A8F5F87F5F4",
              "versionEndExcluding": "4.5.10",
              "versionStartIncluding": "4.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "011C42DE-43E0-4EF0-B580-C0F121358D6A",
              "versionEndExcluding": "4.6.4",
              "versionStartIncluding": "4.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba since version 3.5.0 and before 4.6.4, 4.5.10 and 4.4.14 is vulnerable to remote code execution vulnerability, allowing a malicious client to upload a shared library to a writable share, and then cause the server to load and execute it."
    },
    {
      "lang": "es",
      "value": "Samba desde la versi\u00f3n 3.5.0 y anteriores a 4.6.4, versiones 4.5.10 y 4.4.14, son vulnerables a la ejecuci\u00f3n de c\u00f3digo remota, lo que permite que un cliente malicioso cargar una biblioteca compartida en un recurso compartido editable, y luego causar que el servidor lo cargue y ejecute."
    }
  ],
  "id": "CVE-2017-7494",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2017-05-30T18:29:00.190",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2017/dsa-3860"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/98636"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038552"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1270"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1271"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1272"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1273"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1390"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf\u0026p_Doc_Ref=SEVD-2018-095-01"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03755en_us"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03759en_us"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-07"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20170524-0001/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/42060/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/42084/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2017-7494.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2017/dsa-3860"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/98636"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1038552"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1271"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1273"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/errata/RHSA-2017:1390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://download.schneider-electric.com/files?p_enDocType=Technical+leaflet\u0026p_File_Name=SEVD-2018-095-01+Security+Notification+Umotion+V1.1.pdf\u0026p_Doc_Ref=SEVD-2018-095-01"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbns03755en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbux03759en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201805-07"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20170524-0001/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/42060/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/42084/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2017-7494.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-25 18:15
Modified
2024-11-21 07:06
Summary
A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users' passwords, enabling full domain takeover.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22161FC4-92E0-4340-A844-BA2DF50C94E7",
              "versionEndExcluding": "4.14.14",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E54A3-23C1-497D-864D-EDF15D85FB81",
              "versionEndExcluding": "4.15.9",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8479455F-FFCD-46F1-B0E3-EBC082F89C16",
              "versionEndExcluding": "4.16.4",
              "versionStartIncluding": "4.16.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in Samba. The KDC accepts kpasswd requests encrypted with any key known to it. By encrypting forged kpasswd requests with its own key, a user can change other users\u0027 passwords, enabling full domain takeover."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo en Samba. El KDC acepta solicitudes kpasswd cifradas con cualquier clave que conozca. Al cifrar las solicitudes kpasswd falsificadas con su propia clave, un usuario puede cambiar las contrase\u00f1as de otros usuarios, permitiendo una toma de control total del dominio."
    }
  ],
  "id": "CVE-2022-32744",
  "lastModified": "2024-11-21T07:06:52.597",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-25T18:15:10.497",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-32744.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-32744.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-290"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-290"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-05-12 14:15
Modified
2024-11-21 05:46
Summary
A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
References
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1941402Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2021/03/msg00036.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/
secalert@redhat.comhttps://security.gentoo.org/glsa/202105-22Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20210326-0007/Third Party Advisory
secalert@redhat.comhttps://www.debian.org/security/2021/dsa-4884Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2021-20277.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1941402Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/03/msg00036.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202105-22Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20210326-0007/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.debian.org/security/2021/dsa-4884Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2021-20277.htmlVendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2EE6834-8738-446C-BD67-B1D69AD8DFAE",
              "versionEndExcluding": "4.12.13",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54588EC1-AE17-47FD-AFB7-70AB43A49515",
              "versionEndExcluding": "4.13.6",
              "versionStartIncluding": "4.13.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B8145B4-A320-40A3-A24B-3DE0A0170639",
              "versionEndExcluding": "4.14.1",
              "versionStartIncluding": "4.14.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in Samba\u0027s libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo en libldb de Samba. M\u00faltiples espacios iniciales consecutivos en un atributo LDAP pueden conllevar a una escritura de memoria fuera de los l\u00edmites, conllevando a un bloqueo del proceso del servidor LDAP que maneja la petici\u00f3n. La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema"
    }
  ],
  "id": "CVE-2021-20277",
  "lastModified": "2024-11-21T05:46:16.007",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-05-12T14:15:11.140",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941402"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202105-22"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20210326-0007/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2021/dsa-4884"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2021-20277.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00036.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLZ74IF2N75VQSIHBL4B3P5WKWQCXSRY/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X5J3B6PN5XMXF3OHYBNHDKZ3XFSUGY4L/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZXP3ONIY6MB4C5LDZV4YL5KJCES3UX24/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202105-22"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20210326-0007/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2021/dsa-4884"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2021-20277.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
smbd in Samba before 2.2.11 allows remote attackers to cause a denial of service (daemon crash) by sending a FindNextPrintChangeNotify request without a previous FindFirstPrintChangeNotify, as demonstrated by the SMB client in Windows XP SP2.
Impacted products
Vendor Product Version
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.17
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 1.9.18
samba samba 2.0.0
samba samba 2.0.1
samba samba 2.0.2
samba samba 2.0.3
samba samba 2.0.4
samba samba 2.0.5
samba samba 2.0.5a
samba samba 2.0.6
samba samba 2.0.7
samba samba 2.2.0
samba samba 2.2.1
samba samba 2.2.2
samba samba 2.2.3
samba samba 2.2.3a
samba samba 2.2.4
samba samba 2.2.5
samba samba 2.2.6
samba samba 2.2.7
samba samba 2.2.7a
samba samba 2.2.8
samba samba 2.2.8a
samba samba 2.2.9
samba samba 2.2.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3B50D9E-EA43-44BF-9176-610EC808B986",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p1:*:*:*:*:*:*",
              "matchCriteriaId": "BCBBF662-40C3-4280-BE79-9D7C36A6DF5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p2:*:*:*:*:*:*",
              "matchCriteriaId": "59819155-91CF-4B79-BCB2-BE0EBAB4F31E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p3:*:*:*:*:*:*",
              "matchCriteriaId": "BDD6A6AE-C636-4131-807B-59F7784B7AB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p4:*:*:*:*:*:*",
              "matchCriteriaId": "8C6D63F5-B72C-445A-BC61-D52D6022481B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.17:p5:*:*:*:*:*:*",
              "matchCriteriaId": "1ADD724A-1747-4678-A659-0A528B728C66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF3C20A1-F21D-41FF-8B87-B50E1AE8219E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p1:*:*:*:*:*:*",
              "matchCriteriaId": "A3ABEA3A-8F88-4947-80A5-CF1459F5AC8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p10:*:*:*:*:*:*",
              "matchCriteriaId": "86F85E94-9F94-457A-A606-35DB558484A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p2:*:*:*:*:*:*",
              "matchCriteriaId": "1ED4704B-2422-43C9-A2E0-9851F56D4CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p3:*:*:*:*:*:*",
              "matchCriteriaId": "158D175A-E0D7-45EF-BDD2-D86F2E8F7766",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p4:*:*:*:*:*:*",
              "matchCriteriaId": "7854FCEF-D1F8-4DEC-A6CB-C4470899F71C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p5:*:*:*:*:*:*",
              "matchCriteriaId": "36D8B675-C209-4D5A-8EA7-1B3515E930FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p6:*:*:*:*:*:*",
              "matchCriteriaId": "4BCECF31-4C73-4ABA-9F84-D5DBA1DB1F50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p7:*:*:*:*:*:*",
              "matchCriteriaId": "2C5A1382-D147-43E5-8DB7-93B7A3B9AA0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:p8:*:*:*:*:*:*",
              "matchCriteriaId": "3A497A5D-96FC-490E-87EB-94C1BE7338A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F681E4CC-B8D3-48A2-B93E-0363B22B059E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "76D03B96-8FF3-4FC6-BC38-288F3ADBA9BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDF2248C-5A71-49FC-88F4-2D1F376155FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4FD10B2-ED2D-4F55-8F0E-77429C8A716E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8F15704-2F2B-4536-A2A0-510B5CE91D09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "93AF43FA-9947-4F26-96E8-1D77BF909AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BDD0125-4C47-404A-9DC0-2E923C66B4D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A46D8D-1535-400B-B1CD-AA2685F4164D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CB46ABA-F403-4715-915D-870BD221C8FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "65AC9643-E1A5-4013-9607-17C6CC7CC63B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCACECDD-40F1-4A9B-8B8A-20565FEE3627",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C71CB60-2689-4A4A-9509-E2F3135E6491",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0129E404-3AE8-4F0E-89CB-7F2FA5B47011",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.3a:*:*:*:*:*:*:*",
              "matchCriteriaId": "614547F5-9C3F-489B-9B72-91B0FF646CCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A052141C-874D-4ED0-99FB-D7468FACFC6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9739EA65-9FA8-425E-B355-E690773D5B1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B618F94-DAC2-4A97-9F7F-8BCEA3199769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE7C057-B024-4417-B572-5D396366620E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.7a:*:*:*:*:*:*:*",
              "matchCriteriaId": "34DC3500-F8F0-46E1-B0AA-C2474CCB3DAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFCD334C-FB95-41A6-8F4C-FCC4E70CE930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.8a:*:*:*:*:*:*:*",
              "matchCriteriaId": "75C86202-3150-440C-B048-BB039E9D3606",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "98CAF474-0C3A-4E49-8CF8-9DF14D84CDCC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:2.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3ABF97-93A2-48C3-898E-9DADD5614BF5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "smbd in Samba before 2.2.11 allows remote attackers to cause a denial of service (daemon crash) by sending a FindNextPrintChangeNotify request without a previous FindFirstPrintChangeNotify, as demonstrated by the SMB client in Windows XP SP2."
    }
  ],
  "id": "CVE-2004-0829",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://samba.org/samba/history/samba-2.2.11.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seclists.org/lists/bugtraq/2004/Sep/0003.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-14.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.trustix.org/errata/2004/0043"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17138"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://samba.org/samba/history/samba-2.2.11.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://seclists.org/lists/bugtraq/2004/Sep/0003.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200409-14.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.trustix.org/errata/2004/0043"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/17138"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vendorComments": [
    {
      "comment": "We do not class this as a security issue; this can only cause a denial of service for the attacker.\n",
      "lastModified": "2006-08-30T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-05-06 14:15
Modified
2024-11-21 04:55
Summary
A flaw was found when using samba as an Active Directory Domain Controller. Due to the way samba handles certain requests as an Active Directory Domain Controller LDAP server, an unauthorized user can cause a stack overflow leading to a denial of service. The highest threat from this vulnerability is to system availability. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2020/11/msg00041.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/
secalert@redhat.comhttps://security.gentoo.org/glsa/202007-15Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2020-10704.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/11/msg00041.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202007-15Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2020-10704.htmlVendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "591689A0-5B37-43D8-98D7-281D87AB4441",
              "versionEndExcluding": "4.10.15",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D64695F-4DA0-447A-A567-A53B77DC4ECC",
              "versionEndExcluding": "4.11.8",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2D79B66-1C66-4A71-BA5B-F0F14FC64558",
              "versionEndExcluding": "4.12.2",
              "versionStartIncluding": "4.12.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found when using samba as an Active Directory Domain Controller. Due to the way samba handles certain requests as an Active Directory Domain Controller LDAP server, an unauthorized user can cause a stack overflow leading to a denial of service. The highest threat from this vulnerability is to system availability. This issue affects all samba versions before 4.10.15, before 4.11.8 and before 4.12.2."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo cuando se usa samba como un Active Directory Domain Controller. Debido a la manera como samba maneja determinadas peticiones como un servidor Active Directory Domain Controller LDAP, un usuario no autorizado puede causar un desbordamiento de la pila conllevando a una denegaci\u00f3n de servicio. La mayor amenaza de esta vulnerabilidad es la disponibilidad del sistema. Este problema afecta a todas las versiones de samba anteriores a 4.10.15, anteriores a 4.11.8 y anteriores a 4.12.2."
    }
  ],
  "id": "CVE-2020-10704",
  "lastModified": "2024-11-21T04:55:53.480",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-05-06T14:15:10.817",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202007-15"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-10704.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10704"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U5KW3ZO35NVDO57JSBZHTQZOS3AIQ5QE/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y7DVGCHG3XPIBQ5ETGMGW7MXNOO4HFH4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202007-15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-10704.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-674"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-674"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-06-17 16:30
Modified
2025-04-11 00:51
Severity ?
Summary
The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
References
secalert@redhat.comhttp://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9280051bfba337458722fb157f3082f93cbd9f2b
secalert@redhat.comhttp://samba.org/samba/history/samba-3.4.8.html
secalert@redhat.comhttp://samba.org/samba/history/samba-3.5.2.html
secalert@redhat.comhttp://security-tracker.debian.org/tracker/CVE-2010-1642
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2010:141
secalert@redhat.comhttp://www.securityfocus.com/bid/40097Exploit
secalert@redhat.comhttp://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29
secalert@redhat.comhttp://www.vupen.com/english/advisories/2010/1933
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=594921
secalert@redhat.comhttps://bugzilla.samba.org/show_bug.cgi?id=7254
af854a3a-2127-422b-91ae-364da2661108http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9280051bfba337458722fb157f3082f93cbd9f2b
af854a3a-2127-422b-91ae-364da2661108http://samba.org/samba/history/samba-3.4.8.html
af854a3a-2127-422b-91ae-364da2661108http://samba.org/samba/history/samba-3.5.2.html
af854a3a-2127-422b-91ae-364da2661108http://security-tracker.debian.org/tracker/CVE-2010-1642
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2010:141
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/40097Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/1933
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=594921
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=7254
Impacted products
Vendor Product Version
samba samba *
samba samba 3.0.0
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.2a
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22
samba samba 3.0.23
samba samba 3.0.23a
samba samba 3.0.23b
samba samba 3.0.23c
samba samba 3.0.23d
samba samba 3.0.24
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25
samba samba 3.0.25a
samba samba 3.0.25b
samba samba 3.0.25c
samba samba 3.0.26
samba samba 3.0.26a
samba samba 3.0.27
samba samba 3.0.27a
samba samba 3.0.28
samba samba 3.0.28a
samba samba 3.0.29
samba samba 3.0.30
samba samba 3.0.31
samba samba 3.0.32
samba samba 3.0.33
samba samba 3.0.34
samba samba 3.0.35
samba samba 3.0.36
samba samba 3.0.37
samba samba 3.1.0
samba samba 3.2
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6
samba samba 3.2.7
samba samba 3.2.8
samba samba 3.2.9
samba samba 3.2.10
samba samba 3.2.11
samba samba 3.2.12
samba samba 3.2.13
samba samba 3.2.14
samba samba 3.2.15
samba samba 3.3
samba samba 3.3.0
samba samba 3.3.1
samba samba 3.3.2
samba samba 3.3.3
samba samba 3.3.4
samba samba 3.3.5
samba samba 3.3.6
samba samba 3.3.7
samba samba 3.3.8
samba samba 3.3.9
samba samba 3.3.10
samba samba 3.3.11
samba samba 3.4
samba samba 3.4.0
samba samba 3.4.1
samba samba 3.4.2
samba samba 3.4.3
samba samba 3.4.4
samba samba 3.4.5
samba samba 3.4.6
samba samba 3.5
samba samba 3.5.0
samba samba 3.5.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6627F8F-50B7-48B7-A071-BEDABD089C15",
              "versionEndIncluding": "3.4.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F84FB25B-5EA5-48DC-B528-E8CCF714C919",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2a:*:*:*:*:*:*:*",
              "matchCriteriaId": "920EF846-41D1-429D-AF0F-3D7950F93069",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "632D2489-3B5E-466E-A6DF-1EF00303869B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "F002F105-A911-4E56-8630-C287DC527E05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "A908DA9D-A8BD-46BA-A71F-BFDEC0A1341E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23a:*:*:*:*:*:*:*",
              "matchCriteriaId": "7CA7905C-51A0-4A56-A6A5-330288613055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23b:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE85033-0658-4D60-8C7A-6E2BD63AFDCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23c:*:*:*:*:*:*:*",
              "matchCriteriaId": "4600AAA4-834D-4F63-8E9A-88CB555C029E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:*:*:*:*:*:*:*",
              "matchCriteriaId": "0762B1DA-7232-478D-805F-5E2A50F8BEAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre1:*:*:*:*:*:*",
              "matchCriteriaId": "9F22FC74-5999-4158-A253-674BF1C21E2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B0BE2AEC-6ACD-422C-AD20-6C034D68C891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "101163D7-D440-43CC-8704-A9614CD8CEE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F0E4811D-3387-4838-94A0-1BD7F3C9C3D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B69EA9CF-627C-4600-B4EC-10E91DB07E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25b:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AF740A1-0BEC-4E29-9C74-F1F906EF3EC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25c:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A8D6D8-A207-498F-8DB2-EB7ED842CE1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "70BB5BA1-F499-40FC-80F6-B3CD2F1BB074",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.26a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A973443-C497-41FB-AF47-529AA2906CCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BEE83D0-8377-49FB-AC7D-3B5E9DB6918B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.27a:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC24403-E706-4073-A04D-53E1B79B59B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28:*:*:*:*:*:*:*",
              "matchCriteriaId": "42F2EB0A-249D-4E81-B459-A88AC60A1D39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.28a:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3AA114-63C8-4B25-86BA-73C6933EE21F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.29:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBEA8397-6E23-49FE-9555-39C9599C6362",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "023C2353-750A-42FC-AC7E-115627E74AAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.31:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28A8721-CA4A-44E1-B740-0B4610374CF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.32:*:*:*:*:*:*:*",
              "matchCriteriaId": "D93572BB-7F00-4137-A079-6FE96CD73F38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.33:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F0B13E8-EF18-4A3D-B228-C7FF128D1FD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B843321-9A8D-4541-9E54-58E2978E2437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.35:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF36A20-3607-43A8-A4CC-169922BC0327",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.36:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB71265E-60C4-4495-8B66-360E96B76FBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1DB3DDE-C0F2-485C-B11E-2DD8A91B8CF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC56F11D-20DE-4399-AED1-DF42C7E62F97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE530BB9-A3ED-4EBB-B8E5-86D4CC5A8C7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4AEDE0A-B15C-4B0B-AFE9-4F96E5F71429",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC8A9943-6949-4B0A-9864-8B4696704098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF1D6FEB-A3C8-41D1-B222-3AD11DB9C4AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "4970BB40-085C-4069-B6F1-7E3726F1CFCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1E6CDA-36BF-4374-BBDF-B6DD52598AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA43C063-EBE1-4C61-9C9E-C84C3A594A52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "6962B6DA-5D78-4702-9546-216971D03F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "39FAD067-8547-41E7-B1BC-74CC55D58AA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "787C3CBF-5E4E-4727-950A-D99F15327CEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D9E86C9-14FE-4C55-A08F-9A0C555260ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4B0684-FDCC-4EE8-AABA-F71204167C81",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7172A430-F124-4200-88C2-8BE486BA5DDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EB9DC7-A196-48ED-893B-733E8CDA961F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D03508-3D54-4D05-A5BC-6F8641B45C2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F235FA61-ECBB-45C8-A48D-FAF12A5E2EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E09D3-68FA-40C9-A478-53707E5F78BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "66D41850-968D-431D-8075-EE9EFF013408",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "873A4A35-2CB0-4D55-B455-19D892776293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "755DA0DD-6DC3-48D9-98D5-9EA2C59CA0B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6680FCFB-CD17-4B4E-B523-A9D969D5F1BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD90F710-95F0-4AE7-A8C9-0DC5FCA01DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.3.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "254D9460-899D-4D06-AC47-1914A42FC09A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCD3046-85BB-40A6-A898-774833033891",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78E2B3A-10C4-4226-A224-8D4AC792B2F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFFCF854-E316-442F-A62F-ACC1CA4E9892",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FE147E-B1D1-4BC2-ACC0-85F39674C064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A63AC0-2B68-46A8-AD96-657C99463E9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6BD30B7-E182-402B-BE72-6C82DC085872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A0C00E2-AD14-46A1-A695-FFE81547303B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC5E48D-95CC-46E9-9491-CA8A5FD9F14E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C705F9A-BEA3-40F9-AC9D-730F3A704731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5900E6E-4379-4321-B69D-F9FBD341ACEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2C56B31-4495-4974-A47F-7D18734C9B5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \\xff\\xff security blob length in a Session Setup AndX request."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n reply_sesssetup_and_X_spnego de sesssetup.c de smbd de Samba anterior a v3.4.8, y v3.5.x anterior a v3.5.2, permite a atacantes remotos provocar una lectura fuera de rango y ocasionar una denegaci\u00f3n de servicio (ca\u00edda del proceso), a trav\u00e9s de una longitud blob -binary large object- de seguridad \\xff\\xff en una solicitud Session Setup AndX."
    }
  ],
  "id": "CVE-2010-1642",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-06-17T16:30:01.873",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9280051bfba337458722fb157f3082f93cbd9f2b"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://samba.org/samba/history/samba-3.4.8.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://samba.org/samba/history/samba-3.5.2.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security-tracker.debian.org/tracker/CVE-2010-1642"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:141"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/40097"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2010/1933"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594921"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=7254"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.samba.org/?p=samba.git%3Ba=commit%3Bh=9280051bfba337458722fb157f3082f93cbd9f2b"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://samba.org/samba/history/samba-3.4.8.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://samba.org/samba/history/samba-3.5.2.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security-tracker.debian.org/tracker/CVE-2010-1642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:141"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/40097"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.stratsec.net/Research/Advisories/Samba-Multiple-DoS-Vulnerabilities-%28SS-2010-005%29"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1933"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=594921"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=7254"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-07-29 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
References
secalert@redhat.comhttp://jvn.jp/en/jp/JVN29529126/index.htmlThird Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=133527864025056&w=2Mailing List, Third Party Advisory
secalert@redhat.comhttp://marc.info/?l=bugtraq&m=133527864025056&w=2Mailing List, Third Party Advisory
secalert@redhat.comhttp://osvdb.org/74071Broken Link
secalert@redhat.comhttp://samba.org/samba/history/samba-3.5.10.htmlVendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45393Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/45488Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/45496Third Party Advisory
secalert@redhat.comhttp://securityreason.com/securityalert/8317Third Party Advisory
secalert@redhat.comhttp://securitytracker.com/id?1025852Third Party Advisory, VDB Entry
secalert@redhat.comhttp://ubuntu.com/usn/usn-1182-1Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2011/dsa-2290Third Party Advisory
secalert@redhat.comhttp://www.exploit-db.com/exploits/17577Exploit, Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543Broken Link
secalert@redhat.comhttp://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543Broken Link
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:121Broken Link
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2011-2522Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/48899Third Party Advisory, VDB Entry
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=721348Issue Tracking, Patch, Third Party Advisory
secalert@redhat.comhttps://bugzilla.samba.org/show_bug.cgi?id=8290Issue Tracking, Patch, Third Party Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/68843Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://jvn.jp/en/jp/JVN29529126/index.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=133527864025056&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=133527864025056&w=2Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/74071Broken Link
af854a3a-2127-422b-91ae-364da2661108http://samba.org/samba/history/samba-3.5.10.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45393Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45488Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45496Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/8317Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1025852Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://ubuntu.com/usn/usn-1182-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2011/dsa-2290Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/17577Exploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:121Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2011-2522Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/48899Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=721348Issue Tracking, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=8290Issue Tracking, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/68843Third Party Advisory, VDB Entry



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A7FE6F3-F8CF-46C6-94B8-2717A3BBA803",
              "versionEndExcluding": "3.3.16",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5559D1ED-F753-4842-9F4A-F78C54817835",
              "versionEndExcluding": "3.4.14",
              "versionStartIncluding": "3.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7738DB4A-F424-481F-93C0-4C1DEBABAABD",
              "versionEndExcluding": "3.5.10",
              "versionStartIncluding": "3.5.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "036E8A89-7A16-411F-9D31-676313BB7244",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "7EBFE35C-E243-43D1-883D-4398D71763CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "87614B58-24AB-49FB-9C84-E8DDBA16353B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF49D26F-142E-468B-87C1-BABEA445255C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program."
    },
    {
      "lang": "es",
      "value": "Varias vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF)  en la herramienta Samba Web Administration (SWAT) en Samba v3.x antes de v3.5.10 permite a atacantes remotos secuestrar la autenticaci\u00f3n de los administradores para las peticiones que (1) apagan los demonios, (2) inician los demonios, (3) agregan recursos compartidos, (4) quitan recursos compartidos, (5) agregan impresoras, (6) eliminan impresoras (7), agregan cuentas de usuario, o (8) quitan cuentas de usuario, como lo demuestran ciertos par\u00e1metros de inicio, parada, y reinicio del programa de estado."
    }
  ],
  "id": "CVE-2011-2522",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-07-29T20:55:02.157",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN29529126/index.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=133527864025056\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=133527864025056\u0026w=2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/74071"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://samba.org/samba/history/samba-3.5.10.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/45393"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/45488"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/45496"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://securityreason.com/securityalert/8317"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1025852"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://ubuntu.com/usn/usn-1182-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2011/dsa-2290"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.exploit-db.com/exploits/17577"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:121"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2011-2522"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/48899"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=721348"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=8290"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68843"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://jvn.jp/en/jp/JVN29529126/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=133527864025056\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://marc.info/?l=bugtraq\u0026m=133527864025056\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/74071"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://samba.org/samba/history/samba-3.5.10.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/45393"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/45488"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/45496"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://securityreason.com/securityalert/8317"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1025852"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://ubuntu.com/usn/usn-1182-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2011/dsa-2290"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.exploit-db.com/exploits/17577"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:121"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2011-2522"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/48899"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=721348"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=8290"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68843"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-01-05 20:30
Modified
2025-04-09 00:30
Severity ?
Summary
Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name.
References
secalert@redhat.comhttp://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch
secalert@redhat.comhttp://osvdb.org/51152
secalert@redhat.comhttp://secunia.com/advisories/33379Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/33392
secalert@redhat.comhttp://secunia.com/advisories/33431
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2009:042
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2009-0022.html
secalert@redhat.comhttp://www.securityfocus.com/bid/33118
secalert@redhat.comhttp://www.securitytracker.com/id?1021513
secalert@redhat.comhttp://www.vupen.com/english/advisories/2009/0017
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/47733
secalert@redhat.comhttps://usn.ubuntu.com/702-1/
secalert@redhat.comhttps://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html
af854a3a-2127-422b-91ae-364da2661108http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/51152
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33379Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33392
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33431
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:042
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2009-0022.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/33118
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1021513
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/0017
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/47733
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/702-1/
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html
Impacted products
Vendor Product Version
samba samba 3.2.0
samba samba 3.2.1
samba samba 3.2.2
samba samba 3.2.3
samba samba 3.2.4
samba samba 3.2.5
samba samba 3.2.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44746973-3CFD-4808-9545-755E296EFF6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "31E4627C-5D19-4599-B304-D0E4D4193170",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE162A7-969D-44D5-B9ED-764F20F19C87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28DF45AE-DF03-4321-A019-D3BBC16433B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D87AD2-89F2-455F-916E-D404E6BD02C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6218AB51-DE71-40F3-8CBC-AF33586D36EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02F8427-0DCC-48A9-A04F-939571D511E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 3.2.0 through 3.2.6, when registry shares are enabled, allows remote authenticated users to access the root filesystem via a crafted connection request that specifies a blank share name."
    },
    {
      "lang": "es",
      "value": "Samba v3.2.0 hasta v3.2.6, cuando el registro de acciones est\u00e1 habilitado, permite a usuarios autenticados remotamente acceder al sistema de ficheros ra\u00edz a trav\u00e9s de una petici\u00f3n de conexi\u00f3n manipulada que especifica un nombre de recurso compartido en blanco."
    }
  ],
  "evaluatorSolution": "Patch Information - http://www.samba.org/samba/history/security.html",
  "id": "CVE-2009-0022",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 6.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:C/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-01-05T20:30:02.390",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/51152"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/33379"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/33392"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/33431"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:042"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.samba.org/samba/security/CVE-2009-0022.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/33118"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securitytracker.com/id?1021513"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2009/0017"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47733"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://usn.ubuntu.com/702-1/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://master.samba.org/samba/ftp/patches/security/samba-3.2.6-CVE-2009-0022.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/51152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/33379"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33431"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:042"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.samba.org/samba/security/CVE-2009-0022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/33118"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021513"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/0017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47733"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/702-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00309.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Not vulnerable. This issue did not affect the versions of samba as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.",
      "lastModified": "2009-01-07T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-25 18:15
Modified
2024-11-21 07:00
Summary
A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other's tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C2499D3-277A-4B0F-AD27-4506D02829DE",
              "versionEndExcluding": "4.14.14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B0E54A3-23C1-497D-864D-EDF15D85FB81",
              "versionEndExcluding": "4.15.9",
              "versionStartIncluding": "4.15.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8479455F-FFCD-46F1-B0E3-EBC082F89C16",
              "versionEndExcluding": "4.16.4",
              "versionStartIncluding": "4.16.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in Samba. The security vulnerability occurs when KDC and the kpasswd service share a single account and set of keys, allowing them to decrypt each other\u0027s tickets. A user who has been requested to change their password, can exploit this flaw to obtain and use tickets to other services."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado un fallo en Samba. Una vulnerabilidad de seguridad es producida cuando el KDC y el servicio kpasswd comparten una misma cuenta y un mismo conjunto de claves, lo que les permite descifrar los tickets del otro. Un usuario al que le haya sido pedido que cambie su contrase\u00f1a, puede explotar este fallo para obtener y usar tickets de otros servicios."
    }
  ],
  "id": "CVE-2022-2031",
  "lastModified": "2024-11-21T07:00:12.323",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-25T18:15:09.837",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-2031.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202309-06"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2022-2031.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-288"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-06 19:15
Modified
2024-11-21 04:56
Summary
A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=1849509%3B
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/
secalert@redhat.comhttps://security.gentoo.org/glsa/202007-15
secalert@redhat.comhttps://usn.ubuntu.com/4409-1/Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2020-10760.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1849509%3B
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202007-15
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4409-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2020-10760.htmlVendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFE2F478-6A74-4D4A-A914-F1B29CB8620F",
              "versionEndExcluding": "4.10.17",
              "versionStartIncluding": "4.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE656EC4-DE4C-4921-A22D-88C9CEDFFECB",
              "versionEndExcluding": "4.11.11",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D8FF3AF-B703-4021-8156-3D767FA10B8E",
              "versionEndExcluding": "4.12.4",
              "versionStartIncluding": "4.12.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A use-after-free flaw was found in all samba LDAP server versions before 4.10.17, before 4.11.11, before 4.12.4 used in a AC DC configuration. A Samba LDAP user could use this flaw to crash samba."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo de uso de la memoria previamente liberada en todas las versiones del servidor LDAP de samba anteriores a 4.10.17, anteriores a 4.11.11, anteriores a 4.12.4, usado en una configuraci\u00f3n AC DC. Un usuario del LDAP de Samba podr\u00eda usar este fallo para bloquear samba"
    }
  ],
  "id": "CVE-2020-10760",
  "lastModified": "2024-11-21T04:56:00.937",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-06T19:15:12.307",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849509%3B"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://security.gentoo.org/glsa/202007-15"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4409-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-10760.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00030.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00054.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00002.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1849509%3B"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YLNQ5GRXUKYRUAOFZ4DUBVN4SMTL6Q2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202007-15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4409-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2020-10760.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-416"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-06 10:15
Modified
2024-11-21 04:27
Summary
A flaw was found in Samba, all versions starting samba 4.5.0 before samba 4.9.15, samba 4.10.10, samba 4.11.2, in the way it handles a user password change or a new password for a samba user. The Samba Active Directory Domain Controller can be configured to use a custom script to check for password complexity. This configuration can fail to verify password complexity when non-ASCII characters are used in the password, which could lead to weak passwords being set for samba users, making it vulnerable to dictionary attacks.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.htmlThird Party Advisory
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833Issue Tracking, Mitigation, Patch, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2019-14833.htmlMitigation, Vendor Advisory
secalert@redhat.comhttps://www.synology.com/security/advisory/Synology_SA_19_35
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833Issue Tracking, Mitigation, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2019-14833.htmlMitigation, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/security/advisory/Synology_SA_19_35
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE0697DD-2E86-446B-97BA-239EC0269CE4",
              "versionEndExcluding": "4.9.15",
              "versionStartIncluding": "4.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC76A261-FE98-42F2-A791-47FBA16AB791",
              "versionEndExcluding": "4.10.10",
              "versionStartIncluding": "4.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07815BAF-7322-44A3-BE46-EC474DE07238",
              "versionEndExcluding": "4.11.2",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
              "matchCriteriaId": "D100F7CE-FC64-4CC6-852A-6136D72DA419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in Samba, all versions starting samba 4.5.0 before samba 4.9.15, samba 4.10.10, samba 4.11.2, in the way it handles a user password change or a new password for a samba user. The Samba Active Directory Domain Controller can be configured to use a custom script to check for password complexity. This configuration can fail to verify password complexity when non-ASCII characters are used in the password, which could lead to weak passwords being set for samba users, making it vulnerable to dictionary attacks."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 un fallo en Samba, todas las versiones iniciando samba versiones 4.5.0 anteriores a samba 4.9.15, samba versi\u00f3n 4.10.10, samba versi\u00f3n 4.11.2, en la manera en que maneja un cambio de contrase\u00f1a de usuario o una nueva contrase\u00f1a para un usuario de samba. El Controlador de Dominio Active Directory de Samba puede ser configurado para usar un script personalizado para comprobar la complejidad de la contrase\u00f1a. Esta configuraci\u00f3n puede fallar al comprobar la complejidad de la contrase\u00f1a cuando son usados caracteres no ASCII en la contrase\u00f1a, lo que podr\u00eda conllevar a que contrase\u00f1as d\u00e9biles sean establecidas para usuarios de samba, haci\u00e9ndolo vulnerable a ataques de diccionario."
    }
  ],
  "id": "CVE-2019-14833",
  "lastModified": "2024-11-21T04:27:27.527",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.2,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 2.5,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-06T10:15:10.793",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14833.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_35"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00015.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Mitigation",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OKPYHDFI7HRELVXBE5J4MTGSI35AKFBI/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UMIYCYXCPRTVCVZ3TP6ZGPJ6RZS3IX4G/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XQ3IUACPZJXSC4OM6P2V4IC4QMZQZWPD/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14833.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_35"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-305"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-521"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-14 21:19
Modified
2025-04-09 00:30
Severity ?
Summary
Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d through 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user.
References
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980Broken Link
secalert@redhat.comhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980Broken Link
secalert@redhat.comhttp://lists.suse.com/archive/suse-security-announce/2007-May/0006.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://osvdb.org/34698Broken Link
secalert@redhat.comhttp://secunia.com/advisories/25232Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/25241Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/25246Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/25251Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/25255Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/25256Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/25259Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/25270Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/25289Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/25675Third Party Advisory
secalert@redhat.comhttp://secunia.com/advisories/25772Third Party Advisory
secalert@redhat.comhttp://security.gentoo.org/glsa/glsa-200705-15.xmlThird Party Advisory
secalert@redhat.comhttp://securityreason.com/securityalert/2701Third Party Advisory
secalert@redhat.comhttp://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906Mailing List, Third Party Advisory
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1Broken Link
secalert@redhat.comhttp://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1Broken Link
secalert@redhat.comhttp://www.debian.org/security/2007/dsa-1291Third Party Advisory
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:104Broken Link
secalert@redhat.comhttp://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.htmlThird Party Advisory
secalert@redhat.comhttp://www.samba.org/samba/security/CVE-2007-2444.htmlPatch, Vendor Advisory
secalert@redhat.comhttp://www.securityfocus.com/archive/1/468548/100/0/threadedThird Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/archive/1/468670/100/0/threadedThird Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securityfocus.com/bid/23974Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id?1018049Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.trustix.org/errata/2007/0017/Broken Link
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-460-1Third Party Advisory
secalert@redhat.comhttp://www.ubuntu.com/usn/usn-460-2Third Party Advisory
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/1805Permissions Required
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2210Permissions Required
secalert@redhat.comhttp://www.vupen.com/english/advisories/2007/2281Permissions Required
secalert@redhat.comhttps://issues.rpath.com/browse/RPL-1366Broken Link
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980Broken Link
af854a3a-2127-422b-91ae-364da2661108http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01078980Broken Link
af854a3a-2127-422b-91ae-364da2661108http://lists.suse.com/archive/suse-security-announce/2007-May/0006.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/34698Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25232Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25241Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25246Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25251Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25255Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25256Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25259Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25270Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25289Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25675Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25772Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200705-15.xmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/2701Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackware-security.475906Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1Broken Link
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1291Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:104Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CVE-2007-2444.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/468548/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/468670/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23974Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1018049Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0017/Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-460-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-460-2Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1805Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2210Permissions Required
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2281Permissions Required
af854a3a-2127-422b-91ae-364da2661108https://issues.rpath.com/browse/RPL-1366Broken Link
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.23d:*:*:*:*:*:*:*",
              "matchCriteriaId": "54FE8D2E-AF0D-4C84-A5BC-2CE6759B534C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BFA3B82-9440-49E1-8088-FA22C0B7DD88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.25:pre2:*:*:*:*:*:*",
              "matchCriteriaId": "0EEB31C4-5352-4905-8D9E-BD754991F07E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
              "matchCriteriaId": "454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "23E304C9-F780-4358-A58D-1E4C93977704",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:7.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EBDAFF8-DE44-4E80-B6BD-E341F767F501",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Logic error in the SID/Name translation functionality in smbd in Samba 3.0.23d through 3.0.25pre2 allows local users to gain temporary privileges and execute SMB/CIFS protocol operations via unspecified vectors that cause the daemon to transition to the root user."
    },
    {
      "lang": "es",
      "value": "Error l\u00f3gico en la funcionalidad de traducci\u00f3n SID/Name en smbd en Samba 3.0.23d hasta 3.0.25pre2 permite a usuarios locales ganar privilegios de forma temporal y ejecutar operaciones del protocolo SMB/CIFS a trav\u00e9s de vectores no especificados que provocan que el demonio transite al usuario root."
    }
  ],
  "id": "CVE-2007-2444",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-05-14T21:19:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/34698"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25232"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25241"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25246"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25251"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25255"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25256"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25259"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25270"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25289"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25675"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25772"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://securityreason.com/securityalert/2701"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2007/dsa-1291"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2007-2444.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/468548/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/23974"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1018049"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.trustix.org/errata/2007/0017/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-460-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-460-2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/1805"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2210"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2281"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Broken Link"
      ],
      "url": "https://issues.rpath.com/browse/RPL-1366"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01078980"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.suse.com/archive/suse-security-announce/2007-May/0006.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://osvdb.org/34698"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25246"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25255"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25259"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25270"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25289"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25675"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/25772"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://security.gentoo.org/glsa/glsa-200705-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://securityreason.com/securityalert/2701"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2007\u0026m=slackware-security.475906"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102964-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200588-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2007/dsa-1291"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:104"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.samba.org/samba/security/CVE-2007-2444.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/468548/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/468670/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/23974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id?1018049"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.trustix.org/errata/2007/0017/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-460-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/usn-460-2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/1805"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required"
      ],
      "url": "http://www.vupen.com/english/advisories/2007/2281"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://issues.rpath.com/browse/RPL-1366"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vendorComments": [
    {
      "comment": "Not vulnerable. These issues did not affect the versions of Samba as shipped with Red Hat Enterprise Linux 2.1, 3, 4, or 5.",
      "lastModified": "2007-05-15T00:00:00",
      "organization": "Red Hat"
    }
  ],
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-03-13 22:59
Modified
2025-04-12 10:46
Summary
The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://www.debian.org/security/2016/dsa-3514Third Party Advisory
secalert@redhat.comhttp://www.securityfocus.com/bid/84267Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.securitytracker.com/id/1035220Third Party Advisory, VDB Entry
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-2922-1Third Party Advisory
secalert@redhat.comhttps://bugzilla.samba.org/show_bug.cgi?id=11648Issue Tracking, Vendor Advisory
secalert@redhat.comhttps://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2015-7560.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2016/dsa-3514Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/84267Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1035220Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-2922-1Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.samba.org/show_bug.cgi?id=11648Issue Tracking, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2015-7560.htmlVendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B3770C-EA58-406C-BF07-FD5AB4CBFF96",
              "versionEndExcluding": "4.1.23",
              "versionStartIncluding": "3.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B71571B-8D9E-41C9-800A-4C7752D40B7A",
              "versionEndExcluding": "4.2.9",
              "versionStartIncluding": "4.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C70D917-053E-4024-AEC2-200D6E88A1B0",
              "versionEndExcluding": "4.3.6",
              "versionStartIncluding": "4.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "85877BF1-8B16-4FED-8CDD-3EE9E1999BE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "02A189FF-0E20-4F84-8935-C218F5ED126B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:4.4.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "55F79F4D-6C85-4388-B7C4-C07AB5502A0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
              "matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "E88A537F-F4D0-46B9-9E37-965233C2A355",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The SMB1 implementation in smbd in Samba 3.x and 4.x before 4.1.23, 4.2.x before 4.2.9, 4.3.x before 4.3.6, and 4.4.x before 4.4.0rc4 allows remote authenticated users to modify arbitrary ACLs by using a UNIX SMB1 call to create a symlink, and then using a non-UNIX SMB1 call to write to the ACL content."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n de SMB1 en smbd en Samba 3.x y 4.x en versiones anteriores a 4.1.23, 4.2.x en versiones anteriores a 4.2.9, 4.3.x en versiones anteriores a 4.3.6 y 4.4.x en versiones anteriores a 4.4.0rc4 permite a usuarios remotos autenticados modificar ACLs arbitrarias utilizando una llamada UNIX SMB1 para crear un enlace simb\u00f3lico, y despu\u00e9s usar una llamada no-UNIX SMB1 para escribir en el contenido de la ACL."
    }
  ],
  "id": "CVE-2015-7560",
  "lastModified": "2025-04-12T10:46:40.837",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-03-13T22:59:00.123",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3514"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/84267"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1035220"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2922-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=11648"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2015-7560.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178730.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/178764.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2016-March/180000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00063.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00064.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00065.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00081.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00090.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00092.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00042.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00047.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00048.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2016/dsa-3514"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/84267"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securitytracker.com/id/1035220"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.ubuntu.com/usn/USN-2922-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=11648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05121842"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2015-7560.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-10 23:15
Modified
2024-11-21 04:27
Summary
All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permissions on the DNS partition allow creation of new records by authenticated users. This is used for example to allow machines to self-register in DNS. If a DNS record was created that case-insensitively matched the name of the zone, the ldb_qsort() and dns_name_compare() routines could be confused into reading memory prior to the list of DNS entries when responding to DnssrvEnumRecords() or DnssrvEnumRecords2() and so following invalid memory as a pointer.
References
secalert@redhat.comhttp://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.htmlMailing List, Third Party Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2024/06/24/3
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861Issue Tracking, Third Party Advisory
secalert@redhat.comhttps://lists.debian.org/debian-lts-announce/2021/05/msg00023.htmlMailing List, Third Party Advisory
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/
secalert@redhat.comhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/
secalert@redhat.comhttps://security.gentoo.org/glsa/202003-52Third Party Advisory
secalert@redhat.comhttps://security.netapp.com/advisory/ntap-20191210-0002/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/4217-1/Third Party Advisory
secalert@redhat.comhttps://usn.ubuntu.com/4217-2/Third Party Advisory
secalert@redhat.comhttps://www.samba.org/samba/security/CVE-2019-14861.htmlVendor Advisory
secalert@redhat.comhttps://www.synology.com/security/advisory/Synology_SA_19_40Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2024/06/24/3
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/05/msg00023.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/202003-52Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.netapp.com/advisory/ntap-20191210-0002/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4217-1/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/4217-2/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.samba.org/samba/security/CVE-2019-14861.htmlVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.synology.com/security/advisory/Synology_SA_19_40Third Party Advisory



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "26C10D91-8EB3-4869-9C66-B73EF3A4F270",
              "versionEndExcluding": "4.9.17",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA37AE3F-78AA-4807-8C66-7C197045D0F8",
              "versionEndExcluding": "4.10.11",
              "versionStartIncluding": "4.10.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "776B9CDE-BF44-4A36-9C07-F0F71E66533D",
              "versionEndExcluding": "4.11.3",
              "versionStartIncluding": "4.11.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
              "matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
              "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
              "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD783B0C-9246-47D9-A937-6144FE8BFF0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "All Samba versions 4.x.x before 4.9.17, 4.10.x before 4.10.11 and 4.11.x before 4.11.3 have an issue, where the (poorly named) dnsserver RPC pipe provides administrative facilities to modify DNS records and zones. Samba, when acting as an AD DC, stores DNS records in LDAP. In AD, the default permissions on the DNS partition allow creation of new records by authenticated users. This is used for example to allow machines to self-register in DNS. If a DNS record was created that case-insensitively matched the name of the zone, the ldb_qsort() and dns_name_compare() routines could be confused into reading memory prior to the list of DNS entries when responding to DnssrvEnumRecords() or DnssrvEnumRecords2() and so following invalid memory as a pointer."
    },
    {
      "lang": "es",
      "value": "Todas las versiones de Samba versiones 4.x.x anteriores a 4.9.17, versiones 4.10.x anteriores a 4.10.11 y versiones 4.11.x anteriores a 4.11.3, presentan un problema en el que la tuber\u00eda RPC dnsserver (pobremente nombrada) provee instalaciones administrativas para modificar registros y zonas DNS. Samba, cuando act\u00faa como AD DC, almacena registros DNS en LDAP. En AD, los permisos predeterminados en la partici\u00f3n DNS permiten la creaci\u00f3n de nuevos registros por parte de usuarios autenticados. Esto es usado, por ejemplo, para permitir que las m\u00e1quinas se registren autom\u00e1ticamente en DNS. Si un registro DNS fue creado que no distingue entre may\u00fasculas y min\u00fasculas el nombre de la zona, las rutinas ldb_qsort() y dns_name_compare() podr\u00edan ser confundidas en la memoria de lectura antes de la lista de entradas DNS al responder a la funci\u00f3n DnssrvEnumRecords() o DnssrvEnumRecords2() y entonces seguir la memoria inv\u00e1lida como un puntero."
    }
  ],
  "id": "CVE-2019-14861",
  "lastModified": "2024-11-21T04:27:31.217",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-10T23:15:10.360",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2024/06/24/3"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20191210-0002/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4217-1/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4217-2/"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14861.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_40"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00038.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2024/06/24/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14861"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/05/msg00023.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PJH3ROOFYMOATD2UEPC47P5RPBDTY77E/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNKA4YIPV7AZR7KK3GW6L3HKGHSGJZFE/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/202003-52"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20191210-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4217-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://usn.ubuntu.com/4217-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2019-14861.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.synology.com/security/advisory/Synology_SA_19_40"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-07-12 19:05
Modified
2025-04-03 01:03
Severity ?
Summary
The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests.
References
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=304829
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
cve@mitre.orghttp://secunia.com/advisories/20980Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20983Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/21018
cve@mitre.orghttp://secunia.com/advisories/21019
cve@mitre.orghttp://secunia.com/advisories/21046
cve@mitre.orghttp://secunia.com/advisories/21086
cve@mitre.orghttp://secunia.com/advisories/21143
cve@mitre.orghttp://secunia.com/advisories/21159
cve@mitre.orghttp://secunia.com/advisories/21187
cve@mitre.orghttp://secunia.com/advisories/21190
cve@mitre.orghttp://secunia.com/advisories/21262
cve@mitre.orghttp://secunia.com/advisories/22875
cve@mitre.orghttp://secunia.com/advisories/23155
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200607-10.xml
cve@mitre.orghttp://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html
cve@mitre.orghttp://securitytracker.com/id?1016459
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.416876
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1110
cve@mitre.orghttp://www.kb.cert.org/vuls/id/313836US Government Resource
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:120
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_17_sr.html
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2006-0591.html
cve@mitre.orghttp://www.samba.org/samba/security/CAN-2006-3403.htmlPatch
cve@mitre.orghttp://www.securityfocus.com/archive/1/439757/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/439875/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/439880/100/100/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/440767/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/440836/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/448957/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/448957/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/451404/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/451417/100/200/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/451426/100/200/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/18927Patch
cve@mitre.orghttp://www.ubuntu.com/usn/usn-314-1
cve@mitre.orghttp://www.us-cert.gov/cas/techalerts/TA06-333A.htmlUS Government Resource
cve@mitre.orghttp://www.vmware.com/download/esx/esx-202-200610-patch.html
cve@mitre.orghttp://www.vmware.com/download/esx/esx-213-200610-patch.html
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2745
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/4502
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/4750
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/27648
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=304829
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20980Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20983Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21018
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21019
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21046
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21086
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21143
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21159
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21187
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21190
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21262
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22875
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23155
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200607-10.xml
af854a3a-2127-422b-91ae-364da2661108http://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016459
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.416876
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1110
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/313836US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:120
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_17_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2006-0591.html
af854a3a-2127-422b-91ae-364da2661108http://www.samba.org/samba/security/CAN-2006-3403.htmlPatch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/439757/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/439875/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/439880/100/100/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/440767/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/440836/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/448957/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/448957/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/451404/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/451417/100/200/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/451426/100/200/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/18927Patch
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-314-1
af854a3a-2127-422b-91ae-364da2661108http://www.us-cert.gov/cas/techalerts/TA06-333A.htmlUS Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/download/esx/esx-202-200610-patch.html
af854a3a-2127-422b-91ae-364da2661108http://www.vmware.com/download/esx/esx-213-200610-patch.html
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2745
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4502
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4750
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/27648
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355
Impacted products
Vendor Product Version
samba samba 3.0.1
samba samba 3.0.2
samba samba 3.0.3
samba samba 3.0.4
samba samba 3.0.5
samba samba 3.0.6
samba samba 3.0.7
samba samba 3.0.8
samba samba 3.0.9
samba samba 3.0.10
samba samba 3.0.11
samba samba 3.0.12
samba samba 3.0.13
samba samba 3.0.14
samba samba 3.0.14a
samba samba 3.0.15
samba samba 3.0.16
samba samba 3.0.17
samba samba 3.0.18
samba samba 3.0.19
samba samba 3.0.20a
samba samba 3.0.20b
samba samba 3.0.21
samba samba 3.0.21a
samba samba 3.0.21b
samba samba 3.0.21c
samba samba 3.0.22



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "216145B7-4716-42F7-90DC-03884ECB2271",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "898968E5-577E-4B86-A804-EBEC67157A61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8016DC4F-F410-4401-BDCC-91BE0D44D028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC94A2CF-85DF-4BB5-8F78-470A3454C3CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FC116E5-B739-4E18-AA51-FFF59EBCA08F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D40F682-9F2E-465F-98F7-23E1036C74A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "9478CC84-802F-4960-ACAB-3700154E813F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BEA3806-E33A-49A6-99A4-095B4E543C43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7D08FB-30B9-4E42-B831-21A0C095062C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E6C8A4-FA17-44EF-A447-C73108540B59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "57D5EA00-CC2E-4E56-8297-A3C1CEDBBE06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E05AD3-C7F0-421D-8C9B-604E553332E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A53517C-F12D-4D74-A722-5AE23598CEC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BF4A0A7-E176-4009-BAA2-E23B330D91A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.14a:*:*:*:*:*:*:*",
              "matchCriteriaId": "42EB6115-CC45-4464-8400-D7E3A9402803",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B06DAF-869F-481B-965D-70353581A6E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBF1A1D4-39DE-4227-A6E0-7E7817BDCCE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "84F0E277-09BD-4FA8-B2A3-7E83AD1656BD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F260B05-3963-49BF-9D96-EB06722C5483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A7E91B-7B13-47E5-B8E6-CE7D6DC490F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20a:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1936E19-9887-4E53-AA0C-738ABD4B97EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.20b:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2206C09-6A4B-4EC4-A206-E48EDF966913",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B918306-8743-404D-A035-CC3997ADCC3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21a:*:*:*:*:*:*:*",
              "matchCriteriaId": "43684906-D3AA-40FB-A75D-ED65C1DC9BB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21b:*:*:*:*:*:*:*",
              "matchCriteriaId": "62E39538-4811-49DB-97CF-1F018C58BAE4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.21c:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D69FE-AF43-4B0E-A7A9-2D2C16426180",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:3.0.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "86347948-C08F-4F02-89A0-4F4A55CD4BA7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The smdb daemon (smbd/service.c) in Samba 3.0.1 through 3.0.22 allows remote attackers to cause a denial of service (memory consumption) via a large number of share connection requests."
    },
    {
      "lang": "es",
      "value": "El demonio smdb (smbd/service.c) en Samba versiones 3.0.1 hasta la 3.0.22, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (consumo de memoria) a trav\u00e9s de un gran n\u00famero de peticiones de conexi\u00f3n compartida."
    }
  ],
  "id": "CVE-2006-3403",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-07-12T19:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://docs.info.apple.com/article.html?artnum=304829"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20980"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20983"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21018"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21019"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21046"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21086"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21143"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21159"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21187"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21190"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21262"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22875"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23155"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200607-10.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016459"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.416876"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1110"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/313836"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:120"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_17_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0591.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.samba.org/samba/security/CAN-2006-3403.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/439757/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/439875/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/439880/100/100/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/440767/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/440836/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/448957/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/448957/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/18927"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-314-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2745"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/4502"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/4750"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27648"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060703-01-U.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=304829"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2006/Nov/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20980"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20983"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21018"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21019"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21046"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21086"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21143"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21187"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21190"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21262"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22875"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200607-10.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitydot.net/xpl/exploits/vulnerabilities/articles/1175/exploit.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016459"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.416876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/313836"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:120"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_17_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2006-0591.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.samba.org/samba/security/CAN-2006-3403.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/439757/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/439875/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/439880/100/100/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/440767/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/440836/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/448957/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/448957/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/451404/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/451417/100/200/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/451426/100/200/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/18927"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-314-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-333A.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/download/esx/esx-202-200610-patch.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/download/esx/esx-213-200610-patch.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2745"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4502"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4750"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27648"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11355"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-03 08:15
Modified
2024-11-21 08:22
Summary
A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba's RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation "classic DCs") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as "The procedure number is out of range" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services.
Impacted products
Vendor Product Version
samba samba *
samba samba *
samba samba *
fedoraproject fedora 39



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C9913F9-D46D-4CE3-AA78-E50D32779971",
              "versionEndExcluding": "4.17.12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A33312F-1523-4647-83DA-6DD6231906F9",
              "versionEndExcluding": "4.18.8",
              "versionStartIncluding": "4.18.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE496104-DDB5-4709-8026-C83E99B0C865",
              "versionEndExcluding": "4.19.1",
              "versionStartIncluding": "4.19.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A flaw was found in Samba. It is susceptible to a vulnerability where multiple incompatible RPC listeners can be initiated, causing disruptions in the AD DC service. When Samba\u0027s RPC server experiences a high load or unresponsiveness, servers intended for non-AD DC purposes (for example, NT4-emulation \"classic DCs\") can erroneously start and compete for the same unix domain sockets. This issue leads to partial query responses from the AD DC, causing issues such as \"The procedure number is out of range\" when using tools like Active Directory Users. This flaw allows an attacker to disrupt AD DC services."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 una falla en Samba. Es susceptible a una vulnerabilidad en la que se pueden iniciar m\u00faltiples escuchas RPC incompatibles, lo que provoca interrupciones en el servicio AD DC. Cuando el servidor RPC de Samba experimenta una carga alta o no responde, los servidores destinados a fines que no son AD DC (por ejemplo, los \"DC cl\u00e1sicos\" de NT4-emulation) pueden iniciarse err\u00f3neamente y competir por los mismos sockets de dominio Unix. Este problema genera respuestas de consulta parciales del AD DC, lo que provoca problemas como \"El n\u00famero de procedimiento est\u00e1 fuera de rango\" cuando se utilizan herramientas como Usuarios de Active Directory. Esta falla permite a un atacante interrumpir los servicios de AD DC."
    }
  ],
  "id": "CVE-2023-42670",
  "lastModified": "2024-11-21T08:22:55.610",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-03T08:15:07.883",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-42670"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241885"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=15473"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-42670.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://access.redhat.com/security/cve/CVE-2023-42670"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241885"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.samba.org/show_bug.cgi?id=15473"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20231124-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.samba.org/samba/security/CVE-2023-42670.html"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
1998-11-19 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:samba:samba:1.9.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF3C20A1-F21D-41FF-8B87-B50E1AE8219E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC52A20-B706-432D-9A15-45F48EB1B08B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:caldera:openlinux:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8A9DB15-1F04-4864-A8AD-FCCB35A63B2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5C77FA7-C977-4223-B6AC-91B82C45129C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:caldera:openlinux:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EED21F27-4ADA-42AC-B28E-F849F47D4043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B133DAC8-2B0D-4F83-9025-AD071740187A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:turbolinux:turbolinux:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A03039A-881A-44C6-B69E-0BDC7914216F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program."
    }
  ],
  "id": "CVE-1999-1288",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "1998-11-19T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.caldera.com/support/security/advisories/SA-1998.35.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/11397"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1406"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.caldera.com/support/security/advisories/SA-1998.35.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/11397"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/1406"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-05-14 21:19
Modified
2025-04-09 00:30
Severity ?
Summary